General

  • Target

    ff7353b61dcbc157e2f89034fdb72cf0_JaffaCakes118

  • Size

    130KB

  • Sample

    241219-l8cnvaznat

  • MD5

    ff7353b61dcbc157e2f89034fdb72cf0

  • SHA1

    9748ef9fe2a118e4c5ef75c4927a995183b96e59

  • SHA256

    319e892be206faef2546ccc009a46cb2062b15bada048d98d24dcccb6b517555

  • SHA512

    a1e64ccd703eac90809c45276d939258925d52b00250dbeb1dc837e7096078dcb02dc7864fc2bbe321535df296561e04cf906379e5f56c8c6a8096f04f71b74a

  • SSDEEP

    1536:c8Id8o7aomglQQGF+f1tUlho4swrUzgRXAnTumTO7MGFSjq0ccQL:o+o7ZmQQT+clzdUzW4imCBSjqTL

Malware Config

Extracted

Family

tofsee

C2

94.242.250.149

91.218.38.245

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      ff7353b61dcbc157e2f89034fdb72cf0_JaffaCakes118

    • Size

      130KB

    • MD5

      ff7353b61dcbc157e2f89034fdb72cf0

    • SHA1

      9748ef9fe2a118e4c5ef75c4927a995183b96e59

    • SHA256

      319e892be206faef2546ccc009a46cb2062b15bada048d98d24dcccb6b517555

    • SHA512

      a1e64ccd703eac90809c45276d939258925d52b00250dbeb1dc837e7096078dcb02dc7864fc2bbe321535df296561e04cf906379e5f56c8c6a8096f04f71b74a

    • SSDEEP

      1536:c8Id8o7aomglQQGF+f1tUlho4swrUzgRXAnTumTO7MGFSjq0ccQL:o+o7ZmQQT+clzdUzW4imCBSjqTL

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks