General

  • Target

    d887b432d304fc87e65f7db06d5048f1_JaffaCakes118

  • Size

    11.9MB

  • Sample

    241209-jdnfravrhn

  • MD5

    d887b432d304fc87e65f7db06d5048f1

  • SHA1

    0f6c7291f4fdc0ef4e3e1a8a2ec2a86db40c2055

  • SHA256

    e58ca9fc9c222c815d84c361240682167ac69a478ce7b44611db279ee3e1f0c7

  • SHA512

    7ef0baefa08bceed0f255eefefbfd4dee1cf271912d47518ecd2d5d7927e1df6291f80dc83fb29b58d79a85e1520af127fdfb79f0ba79cde7948dfd85d4a0fe8

  • SSDEEP

    12288:CZq+cdlGKSEdlGfxl5V/ZAMbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbn:Ck9dVcl5V/Z

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      d887b432d304fc87e65f7db06d5048f1_JaffaCakes118

    • Size

      11.9MB

    • MD5

      d887b432d304fc87e65f7db06d5048f1

    • SHA1

      0f6c7291f4fdc0ef4e3e1a8a2ec2a86db40c2055

    • SHA256

      e58ca9fc9c222c815d84c361240682167ac69a478ce7b44611db279ee3e1f0c7

    • SHA512

      7ef0baefa08bceed0f255eefefbfd4dee1cf271912d47518ecd2d5d7927e1df6291f80dc83fb29b58d79a85e1520af127fdfb79f0ba79cde7948dfd85d4a0fe8

    • SSDEEP

      12288:CZq+cdlGKSEdlGfxl5V/ZAMbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbn:Ck9dVcl5V/Z

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks