General

  • Target

    e5a1f80633af2e489a335603dcdce8a1_JaffaCakes118

  • Size

    12.9MB

  • Sample

    241212-kwj2qa1nbk

  • MD5

    e5a1f80633af2e489a335603dcdce8a1

  • SHA1

    17ee8592e4a2a79b135af7b285a0d12261e0dcb8

  • SHA256

    df8d530ece00c2099eca123d50c6854ae0fc11fc69756e3fc6b7940e6c9583c4

  • SHA512

    3444afa24abba60b3b0d1e7efca97a0008c90ca7b65a5f97d70dacb1c7d912b5c7086637332b8bfb7a485e3c25048c5b618cb650a5d0724a8186fb3775aa7ef0

  • SSDEEP

    49152:c2mNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN:p

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      e5a1f80633af2e489a335603dcdce8a1_JaffaCakes118

    • Size

      12.9MB

    • MD5

      e5a1f80633af2e489a335603dcdce8a1

    • SHA1

      17ee8592e4a2a79b135af7b285a0d12261e0dcb8

    • SHA256

      df8d530ece00c2099eca123d50c6854ae0fc11fc69756e3fc6b7940e6c9583c4

    • SHA512

      3444afa24abba60b3b0d1e7efca97a0008c90ca7b65a5f97d70dacb1c7d912b5c7086637332b8bfb7a485e3c25048c5b618cb650a5d0724a8186fb3775aa7ef0

    • SSDEEP

      49152:c2mNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN:p

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks