General

  • Target

    JaffaCakes118_380ccc988d649c1a53cb74a3f61ad835bf852f4bee51b6d325281291a5f0313a

  • Size

    283KB

  • Sample

    241222-c5rtxszpbs

  • MD5

    d939f59a5bcb8560eb5d132ae3e6ea7a

  • SHA1

    82e3e9b15f64bbd80d22205f352c6595476146e5

  • SHA256

    380ccc988d649c1a53cb74a3f61ad835bf852f4bee51b6d325281291a5f0313a

  • SHA512

    6d77b9fc38e18c67226b9eed69b61de3b951787146dfd50099829f4104bb933d3ca4d73708781df8de70641e127c85fe1743cabd22ad5492f7705f2e30a21de4

  • SSDEEP

    3072:jfjgrBX7od3gqQXyYbzbZ5Vrnpxq6LF0o3/ycyo3YsKmMgPmovv8Nbd/iKg4wQ3S:DkrBARQbbZ3Dpx/LDR2mjPMhis3JjY

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_380ccc988d649c1a53cb74a3f61ad835bf852f4bee51b6d325281291a5f0313a

    • Size

      283KB

    • MD5

      d939f59a5bcb8560eb5d132ae3e6ea7a

    • SHA1

      82e3e9b15f64bbd80d22205f352c6595476146e5

    • SHA256

      380ccc988d649c1a53cb74a3f61ad835bf852f4bee51b6d325281291a5f0313a

    • SHA512

      6d77b9fc38e18c67226b9eed69b61de3b951787146dfd50099829f4104bb933d3ca4d73708781df8de70641e127c85fe1743cabd22ad5492f7705f2e30a21de4

    • SSDEEP

      3072:jfjgrBX7od3gqQXyYbzbZ5Vrnpxq6LF0o3/ycyo3YsKmMgPmovv8Nbd/iKg4wQ3S:DkrBARQbbZ3Dpx/LDR2mjPMhis3JjY

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks