General

  • Target

    JaffaCakes118_73a8b9c09314a9b07e418584d3f1702ca82a96054227a68abf00cd0488b15d44

  • Size

    194KB

  • Sample

    241223-qrty1s1kas

  • MD5

    d395bddf3f07e8a5c9e2bcf4a513f231

  • SHA1

    d2fc6393f11b7441a7630ba54a74edc8da3a8e9a

  • SHA256

    73a8b9c09314a9b07e418584d3f1702ca82a96054227a68abf00cd0488b15d44

  • SHA512

    a9929fe07ae09c178ffed83a5658f02a4521aab8eebc78afe41cea1d40b90b02f69f3e933d788b2ad3210dbb1b0e267987708dfcb9f55d4c5abde875a9cd082e

  • SSDEEP

    6144:pLcuqP+dIAbxkgStJvCwENs7DOmLPj2JX:Zm76nWFaJX

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      38a30aee82cdd8e5338e168d99fdce7b8e032a89da64e48751b2e45f9d50ad13

    • Size

      350KB

    • MD5

      fd449b229977fbbdaf1458a6753ca2f5

    • SHA1

      b854dec813042816a243aa28e0bbabbe5bb84748

    • SHA256

      38a30aee82cdd8e5338e168d99fdce7b8e032a89da64e48751b2e45f9d50ad13

    • SHA512

      6192ce8e0becb960e082f2b5c1be1e01e8af718b6dbf579c12d5110dd1965f1554143efecfa733b80e43d91fd46f7601113a25c31030b21cfca54aad7f378e7b

    • SSDEEP

      6144:UZF8S00N4dKCSi01IthnHYKKTsVB+6qlYUjUTjENs7Da7zRr:Uv8Sxi1jnHYhTsVB+TVo8W6zt

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks