General

  • Target

    e0a170a43c2af3360b666b2aa742fbd2_JaffaCakes118

  • Size

    11.6MB

  • Sample

    241211-ketvlazjhj

  • MD5

    e0a170a43c2af3360b666b2aa742fbd2

  • SHA1

    a8a594c2742acbc4ee2adcad2b94eddc25357c32

  • SHA256

    4cd18aa5224d0d65b237774ae232b11bf9dd9a722e2707dce442f843e571ff71

  • SHA512

    a67c44b013daf360812d5b1009007db4c6ff846429aed8261bbfab6778e41c3f07409d3e9ab05f61ac7db77d96bccb00d10b8521208dd0420527b8855fdd15bf

  • SSDEEP

    6144:BeeKozztQBnWJ4ZF+PAb1nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn:BeeKozCBnuA

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      e0a170a43c2af3360b666b2aa742fbd2_JaffaCakes118

    • Size

      11.6MB

    • MD5

      e0a170a43c2af3360b666b2aa742fbd2

    • SHA1

      a8a594c2742acbc4ee2adcad2b94eddc25357c32

    • SHA256

      4cd18aa5224d0d65b237774ae232b11bf9dd9a722e2707dce442f843e571ff71

    • SHA512

      a67c44b013daf360812d5b1009007db4c6ff846429aed8261bbfab6778e41c3f07409d3e9ab05f61ac7db77d96bccb00d10b8521208dd0420527b8855fdd15bf

    • SSDEEP

      6144:BeeKozztQBnWJ4ZF+PAb1nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn:BeeKozCBnuA

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks