General

  • Target

    eea0d82d85f2010a0d24f75acb725238_JaffaCakes118

  • Size

    10.6MB

  • Sample

    241214-n1y8zssnfj

  • MD5

    eea0d82d85f2010a0d24f75acb725238

  • SHA1

    ddb1710404535d2f139a3edc90c1816034bc78f8

  • SHA256

    12a920c32a2bf8d2dcd2e7539ca614e6535563acd22dea2a49feb10f8b430e40

  • SHA512

    54aa21bec6e22558a51c061ef0c0bf4c10c80008d009701a18fe6e733d8b278d7af8e7c489ce95dc36de04ee5c1dc8366a9217ade58ec51a73cf358074cdbaf5

  • SSDEEP

    24576:Em1111111111111111111111111111111111111111111111111111111111111f:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      eea0d82d85f2010a0d24f75acb725238_JaffaCakes118

    • Size

      10.6MB

    • MD5

      eea0d82d85f2010a0d24f75acb725238

    • SHA1

      ddb1710404535d2f139a3edc90c1816034bc78f8

    • SHA256

      12a920c32a2bf8d2dcd2e7539ca614e6535563acd22dea2a49feb10f8b430e40

    • SHA512

      54aa21bec6e22558a51c061ef0c0bf4c10c80008d009701a18fe6e733d8b278d7af8e7c489ce95dc36de04ee5c1dc8366a9217ade58ec51a73cf358074cdbaf5

    • SSDEEP

      24576:Em1111111111111111111111111111111111111111111111111111111111111f:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks