General

  • Target

    JaffaCakes118_abb02d0e5622d63642e0ddbfcc1788078a8618a6a7c8094956d877704cb86cac

  • Size

    157KB

  • Sample

    241222-pbbxtsxmes

  • MD5

    cd6e5ac889b0cc1a71bd010f1b58ec00

  • SHA1

    ef8533ce236484acce96615d8b1dd99a387212fc

  • SHA256

    abb02d0e5622d63642e0ddbfcc1788078a8618a6a7c8094956d877704cb86cac

  • SHA512

    74f48a093c96c087bdde32c81cadaedd457acfa36fc17f64ff23ce0c303e83c489cce3e7610d565d2feba415638c00f451b6662cee5e2045c53d9bbed148e51b

  • SSDEEP

    3072:GPEYIsfqkdK0Y4EdFN5uMum0X1Zy//S9H6:GsnsiJ0GKDZy//Ea

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_abb02d0e5622d63642e0ddbfcc1788078a8618a6a7c8094956d877704cb86cac

    • Size

      157KB

    • MD5

      cd6e5ac889b0cc1a71bd010f1b58ec00

    • SHA1

      ef8533ce236484acce96615d8b1dd99a387212fc

    • SHA256

      abb02d0e5622d63642e0ddbfcc1788078a8618a6a7c8094956d877704cb86cac

    • SHA512

      74f48a093c96c087bdde32c81cadaedd457acfa36fc17f64ff23ce0c303e83c489cce3e7610d565d2feba415638c00f451b6662cee5e2045c53d9bbed148e51b

    • SSDEEP

      3072:GPEYIsfqkdK0Y4EdFN5uMum0X1Zy//S9H6:GsnsiJ0GKDZy//Ea

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks