General

  • Target

    JaffaCakes118_9cec2ebe9b47146dde04ddcb8f3b5fdf06c37dd715b8e49c0d3c9e41936c3a1a

  • Size

    283KB

  • Sample

    241222-ba3ghawqbt

  • MD5

    e195bfdd18f903b311011880ebc8137b

  • SHA1

    afc1a2c5616ba8679044268f857b9a8b14515e88

  • SHA256

    9cec2ebe9b47146dde04ddcb8f3b5fdf06c37dd715b8e49c0d3c9e41936c3a1a

  • SHA512

    53ab4df184d7809435ae72d43e77830ef01cd55d1b4a6ac86353eecf710f327ce9d782d61bae2a54e626ae3887e97e552561b6b110c87aab0ddd308101d65c38

  • SSDEEP

    6144:1sIcItQ9Tbk38eWk/cN0x/US5IjoqcZdje6id:1sIcItQBb9eNcahDqAdje

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_9cec2ebe9b47146dde04ddcb8f3b5fdf06c37dd715b8e49c0d3c9e41936c3a1a

    • Size

      283KB

    • MD5

      e195bfdd18f903b311011880ebc8137b

    • SHA1

      afc1a2c5616ba8679044268f857b9a8b14515e88

    • SHA256

      9cec2ebe9b47146dde04ddcb8f3b5fdf06c37dd715b8e49c0d3c9e41936c3a1a

    • SHA512

      53ab4df184d7809435ae72d43e77830ef01cd55d1b4a6ac86353eecf710f327ce9d782d61bae2a54e626ae3887e97e552561b6b110c87aab0ddd308101d65c38

    • SSDEEP

      6144:1sIcItQ9Tbk38eWk/cN0x/US5IjoqcZdje6id:1sIcItQBb9eNcahDqAdje

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks