General

  • Target

    JaffaCakes118_78a529d7e685e6ae4c78c54e7638a607abc7684bf6b165b12c67d337047ee714

  • Size

    295KB

  • Sample

    241222-hefxmaxrdq

  • MD5

    9030655a6f62f9a680bc9469372e55fe

  • SHA1

    fd87e7b02a3bda1a7d3c783cf24f43def0437e5f

  • SHA256

    78a529d7e685e6ae4c78c54e7638a607abc7684bf6b165b12c67d337047ee714

  • SHA512

    934a53e399665bffff8cf6a68fd139ed18d60c464fbc1969471a113897282353038f9daa01ccf6366b5846810d41b9fed11dec2b3d18129bc2048f3c6a4d546b

  • SSDEEP

    6144:cQv1fCPcQsRDgQ6QucrF82jg6rhR3TN/x4ue:1dfC/igSucrFpgQhFNs

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Targets

    • Target

      JaffaCakes118_78a529d7e685e6ae4c78c54e7638a607abc7684bf6b165b12c67d337047ee714

    • Size

      295KB

    • MD5

      9030655a6f62f9a680bc9469372e55fe

    • SHA1

      fd87e7b02a3bda1a7d3c783cf24f43def0437e5f

    • SHA256

      78a529d7e685e6ae4c78c54e7638a607abc7684bf6b165b12c67d337047ee714

    • SHA512

      934a53e399665bffff8cf6a68fd139ed18d60c464fbc1969471a113897282353038f9daa01ccf6366b5846810d41b9fed11dec2b3d18129bc2048f3c6a4d546b

    • SSDEEP

      6144:cQv1fCPcQsRDgQ6QucrF82jg6rhR3TN/x4ue:1dfC/igSucrFpgQhFNs

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks