General

  • Target

    JaffaCakes118_8004d9880f148d86544d90cf8d516eefc8571561d1635c03bc91bbb10be11be6

  • Size

    164KB

  • Sample

    241221-yqy6cayjgy

  • MD5

    7a78a6f842b330bc684cdda11ab74aa6

  • SHA1

    a82f763272099af37c783f84b3f8bc40c53a3baa

  • SHA256

    8004d9880f148d86544d90cf8d516eefc8571561d1635c03bc91bbb10be11be6

  • SHA512

    c9ec2869ee5eebcf0e35379c93c9266f84cac02d7f9d8957da3aea2daee088775d5fbec358e479202898561a2011a0c5b8ce909c62bc12b60f7271402eccddf8

  • SSDEEP

    3072:e6s43X9OdK9GTy0+FXwCj7DJ5AuwUbayCVyuS9H6p:en2OdO0cXwCj7TwUbayCQuEa

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_8004d9880f148d86544d90cf8d516eefc8571561d1635c03bc91bbb10be11be6

    • Size

      164KB

    • MD5

      7a78a6f842b330bc684cdda11ab74aa6

    • SHA1

      a82f763272099af37c783f84b3f8bc40c53a3baa

    • SHA256

      8004d9880f148d86544d90cf8d516eefc8571561d1635c03bc91bbb10be11be6

    • SHA512

      c9ec2869ee5eebcf0e35379c93c9266f84cac02d7f9d8957da3aea2daee088775d5fbec358e479202898561a2011a0c5b8ce909c62bc12b60f7271402eccddf8

    • SSDEEP

      3072:e6s43X9OdK9GTy0+FXwCj7DJ5AuwUbayCVyuS9H6p:en2OdO0cXwCj7TwUbayCQuEa

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks