General

  • Target

    JaffaCakes118_f24d1e07c7931d2e1ccf446f136c580960012a5ac3de1aba2d4032ddcd46a0fb

  • Size

    237KB

  • Sample

    241222-j7jdws1lfq

  • MD5

    0cbf3ef7e6557d32b82e1c115d47ac0a

  • SHA1

    7ee44a699bf8b5413e0df423fa488946daccae0a

  • SHA256

    f24d1e07c7931d2e1ccf446f136c580960012a5ac3de1aba2d4032ddcd46a0fb

  • SHA512

    bec960ad7604a51a6c1b41c3cd7bebdd96f4cb5e1aaf60494e5099fe9c05e5d96b3c456b992c46be93c12194b81c638eef29cb483d92b719a832c2221b6f541c

  • SSDEEP

    6144:r4hC1W6n2IzYX7OsWf+I3UbJ+9ItiRatcQ9I:rYVY2IzYHWf+IKJ+CtiYW

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_f24d1e07c7931d2e1ccf446f136c580960012a5ac3de1aba2d4032ddcd46a0fb

    • Size

      237KB

    • MD5

      0cbf3ef7e6557d32b82e1c115d47ac0a

    • SHA1

      7ee44a699bf8b5413e0df423fa488946daccae0a

    • SHA256

      f24d1e07c7931d2e1ccf446f136c580960012a5ac3de1aba2d4032ddcd46a0fb

    • SHA512

      bec960ad7604a51a6c1b41c3cd7bebdd96f4cb5e1aaf60494e5099fe9c05e5d96b3c456b992c46be93c12194b81c638eef29cb483d92b719a832c2221b6f541c

    • SSDEEP

      6144:r4hC1W6n2IzYX7OsWf+I3UbJ+9ItiRatcQ9I:rYVY2IzYHWf+IKJ+CtiYW

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks