General

  • Target

    f6920b77443255c092bbf9df3f1d4451_JaffaCakes118

  • Size

    12.4MB

  • Sample

    241216-beh9esxpeq

  • MD5

    f6920b77443255c092bbf9df3f1d4451

  • SHA1

    670f15293c4a9ad62a043f0506a9cf4cadc67090

  • SHA256

    ab7c17380f2715ab57dc012b1ce4a7e72364cf218623fe7a3075fd6fbffc3666

  • SHA512

    974b99cfde0eec0c71564db6fcd7d3ace305ac90bc1f1b9f9082afcbd848cd58e9f5c62e3246de0951bc2320742a7837fa21d11b9accde357609341f33387aaf

  • SSDEEP

    393216:d888888888888888888888888888888888888888888888888888888888888883:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      f6920b77443255c092bbf9df3f1d4451_JaffaCakes118

    • Size

      12.4MB

    • MD5

      f6920b77443255c092bbf9df3f1d4451

    • SHA1

      670f15293c4a9ad62a043f0506a9cf4cadc67090

    • SHA256

      ab7c17380f2715ab57dc012b1ce4a7e72364cf218623fe7a3075fd6fbffc3666

    • SHA512

      974b99cfde0eec0c71564db6fcd7d3ace305ac90bc1f1b9f9082afcbd848cd58e9f5c62e3246de0951bc2320742a7837fa21d11b9accde357609341f33387aaf

    • SSDEEP

      393216:d888888888888888888888888888888888888888888888888888888888888883:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks