General

  • Target

    JaffaCakes118_31653973bdcd072dec9d14ffbceb3a6f27c1913f1789b1efbbd7aee6e01dbff0

  • Size

    307KB

  • Sample

    241222-px3mnsypgn

  • MD5

    679b272d1cd99cd1afb007e8725b6c0b

  • SHA1

    d187d9bd52a15e258e2eb6718cccc63adc2f75e0

  • SHA256

    31653973bdcd072dec9d14ffbceb3a6f27c1913f1789b1efbbd7aee6e01dbff0

  • SHA512

    1b8ff6fe6c6287a02f28fc2710c663b886d29760a69cf8bc0476b4285e8a81dbd084c28567112fb276381e6600945079f907b7ed43184eb777c2e443c06323b6

  • SSDEEP

    6144:a3nvZPBRh7Q+FLZaBoN9xUWQzuvJduB+hufxh:GvZPBRh75Fb9x06v7O+Efx

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_31653973bdcd072dec9d14ffbceb3a6f27c1913f1789b1efbbd7aee6e01dbff0

    • Size

      307KB

    • MD5

      679b272d1cd99cd1afb007e8725b6c0b

    • SHA1

      d187d9bd52a15e258e2eb6718cccc63adc2f75e0

    • SHA256

      31653973bdcd072dec9d14ffbceb3a6f27c1913f1789b1efbbd7aee6e01dbff0

    • SHA512

      1b8ff6fe6c6287a02f28fc2710c663b886d29760a69cf8bc0476b4285e8a81dbd084c28567112fb276381e6600945079f907b7ed43184eb777c2e443c06323b6

    • SSDEEP

      6144:a3nvZPBRh7Q+FLZaBoN9xUWQzuvJduB+hufxh:GvZPBRh75Fb9x06v7O+Efx

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks