General

  • Target

    JaffaCakes118_f51c2f5462cfec5c2f84094510cc5dbfb5e650de474c0e1f2571ccb61f2b3f3e

  • Size

    306KB

  • Sample

    241223-15xbeatkgp

  • MD5

    0661057150ee41d5430b7cdfa59b9151

  • SHA1

    9a2954d4b64ed1a2347fd601f18f87d36a7306d3

  • SHA256

    f51c2f5462cfec5c2f84094510cc5dbfb5e650de474c0e1f2571ccb61f2b3f3e

  • SHA512

    f88700b8b61a27c34ff8dabd227dceef34909c403d76abbe70d9d11112d08c1b672e4acae8555cc50e3542166ccf34a90ad3dccf2d79cc90cb89fbe1bb46acfb

  • SSDEEP

    6144:CPrWeZIupcl/Yi3FshG74zgmlL6tZeXuZU8:iWeZIupcl1FKG7ogILTXuC

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_f51c2f5462cfec5c2f84094510cc5dbfb5e650de474c0e1f2571ccb61f2b3f3e

    • Size

      306KB

    • MD5

      0661057150ee41d5430b7cdfa59b9151

    • SHA1

      9a2954d4b64ed1a2347fd601f18f87d36a7306d3

    • SHA256

      f51c2f5462cfec5c2f84094510cc5dbfb5e650de474c0e1f2571ccb61f2b3f3e

    • SHA512

      f88700b8b61a27c34ff8dabd227dceef34909c403d76abbe70d9d11112d08c1b672e4acae8555cc50e3542166ccf34a90ad3dccf2d79cc90cb89fbe1bb46acfb

    • SSDEEP

      6144:CPrWeZIupcl/Yi3FshG74zgmlL6tZeXuZU8:iWeZIupcl1FKG7ogILTXuC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks