General

  • Target

    JaffaCakes118_cdbd5d999d6dcf08e27236b15b8944f88b1facc92e08f8c1413ce3b444d7a248

  • Size

    211KB

  • Sample

    241222-begqlawrd1

  • MD5

    9a2f4cdd68133418516dbf4012bdc9bc

  • SHA1

    a9d0a10e228907054c0825171188634092f29680

  • SHA256

    cdbd5d999d6dcf08e27236b15b8944f88b1facc92e08f8c1413ce3b444d7a248

  • SHA512

    9dc9db2729e93df7ae17cc4b366211f4990285ff022ebe8fbc07528e34eaa9d40ae2cf7ba7e86af8b92fc087f12cba69bf032f7956b03213158c1a4d50918206

  • SSDEEP

    6144:BZh9IJwIv6LIUvHtnHWH4IZsztVHeOli:ZeJwxLIUvHR2HopZeOM

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_cdbd5d999d6dcf08e27236b15b8944f88b1facc92e08f8c1413ce3b444d7a248

    • Size

      211KB

    • MD5

      9a2f4cdd68133418516dbf4012bdc9bc

    • SHA1

      a9d0a10e228907054c0825171188634092f29680

    • SHA256

      cdbd5d999d6dcf08e27236b15b8944f88b1facc92e08f8c1413ce3b444d7a248

    • SHA512

      9dc9db2729e93df7ae17cc4b366211f4990285ff022ebe8fbc07528e34eaa9d40ae2cf7ba7e86af8b92fc087f12cba69bf032f7956b03213158c1a4d50918206

    • SSDEEP

      6144:BZh9IJwIv6LIUvHtnHWH4IZsztVHeOli:ZeJwxLIUvHR2HopZeOM

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks