General

  • Target

    JaffaCakes118_868141fac9696831f591de2c4c97e7a8b2f48410967beca6be205f442732918b

  • Size

    295KB

  • Sample

    241222-p31p9symg1

  • MD5

    049203f243f9131a13939ac0cb01dde9

  • SHA1

    be3918792fcbfaa050ff6b2d61e3645f431deed3

  • SHA256

    868141fac9696831f591de2c4c97e7a8b2f48410967beca6be205f442732918b

  • SHA512

    6a28041c3bff8e44fbcea472042d039efcb74138bf6d9de547c4c4b584509bfc9c41f32e21e826f791dee6ace0c94c5639da3c02bc3ec57ca3decf292b3e00cd

  • SSDEEP

    6144:dRYINfi/6dMxoojfen4W2FQblf3yE92C:dn6IMxooK4W2FQd3pD

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Targets

    • Target

      JaffaCakes118_868141fac9696831f591de2c4c97e7a8b2f48410967beca6be205f442732918b

    • Size

      295KB

    • MD5

      049203f243f9131a13939ac0cb01dde9

    • SHA1

      be3918792fcbfaa050ff6b2d61e3645f431deed3

    • SHA256

      868141fac9696831f591de2c4c97e7a8b2f48410967beca6be205f442732918b

    • SHA512

      6a28041c3bff8e44fbcea472042d039efcb74138bf6d9de547c4c4b584509bfc9c41f32e21e826f791dee6ace0c94c5639da3c02bc3ec57ca3decf292b3e00cd

    • SSDEEP

      6144:dRYINfi/6dMxoojfen4W2FQblf3yE92C:dn6IMxooK4W2FQd3pD

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks