General

  • Target

    df22722085baaf84cd07e5d92b7ac69a_JaffaCakes118

  • Size

    10.5MB

  • Sample

    241211-aqff8swpd1

  • MD5

    df22722085baaf84cd07e5d92b7ac69a

  • SHA1

    9be3215a254149267f6477c8e3e64d18aef0e38d

  • SHA256

    e801ec0c491f33580b9474ab6e202b18f6952d48b69019a9c4ed48c279c5cf33

  • SHA512

    c804dcc3643d69d1a4c330eafddd39e043584220d907d42e7dfeb353f5bc67e0fc0d1614e4e769b1d25b627cbe413369bb13e81243b3d25add5b8ad371589531

  • SSDEEP

    49152:Z88888888888888888888888888888888888888888888888888888888888888f:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      df22722085baaf84cd07e5d92b7ac69a_JaffaCakes118

    • Size

      10.5MB

    • MD5

      df22722085baaf84cd07e5d92b7ac69a

    • SHA1

      9be3215a254149267f6477c8e3e64d18aef0e38d

    • SHA256

      e801ec0c491f33580b9474ab6e202b18f6952d48b69019a9c4ed48c279c5cf33

    • SHA512

      c804dcc3643d69d1a4c330eafddd39e043584220d907d42e7dfeb353f5bc67e0fc0d1614e4e769b1d25b627cbe413369bb13e81243b3d25add5b8ad371589531

    • SSDEEP

      49152:Z88888888888888888888888888888888888888888888888888888888888888f:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks