General

  • Target

    e3d03a9bc3c9fb03b13b7a88f5e0c9e2_JaffaCakes118

  • Size

    14.8MB

  • Sample

    241212-agjgjaxqgj

  • MD5

    e3d03a9bc3c9fb03b13b7a88f5e0c9e2

  • SHA1

    d5e7db18e136a7a17e8a42eb2698087d8f525c9d

  • SHA256

    874a9f3f63ed70e21534e934e46414299378b356fd43aa6913830893e1dc0acc

  • SHA512

    994d82123da445ff8a6b5ffcbccc34e73fbe48ff8ba5884b916997d79a95af29877f04394d8dfc87cb2f038707992ee6267e3b9df19bdc4ee1d41aac2d77ce06

  • SSDEEP

    49152:dSGAcdeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee7:dSO

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      e3d03a9bc3c9fb03b13b7a88f5e0c9e2_JaffaCakes118

    • Size

      14.8MB

    • MD5

      e3d03a9bc3c9fb03b13b7a88f5e0c9e2

    • SHA1

      d5e7db18e136a7a17e8a42eb2698087d8f525c9d

    • SHA256

      874a9f3f63ed70e21534e934e46414299378b356fd43aa6913830893e1dc0acc

    • SHA512

      994d82123da445ff8a6b5ffcbccc34e73fbe48ff8ba5884b916997d79a95af29877f04394d8dfc87cb2f038707992ee6267e3b9df19bdc4ee1d41aac2d77ce06

    • SSDEEP

      49152:dSGAcdeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee7:dSO

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks