General

  • Target

    JaffaCakes118_b979755ac86ec02de0068d1d873064ad9c6d73d5ae0ad5f70ebf48d56dfb3a59

  • Size

    286KB

  • Sample

    241223-vrp3aawjhm

  • MD5

    fb73d870e424a23443e73e0593b0ec46

  • SHA1

    17f76ce7d91f19c6030a1d457c72c7aba219d89b

  • SHA256

    b979755ac86ec02de0068d1d873064ad9c6d73d5ae0ad5f70ebf48d56dfb3a59

  • SHA512

    1e28f84c5b9d3a577416194f0d7c7cdcd8915a686e882df1e5261cd11d041865a05b44fe6d3a3c4ea4fa285f548ab88bdf82039cd1c41d799b871414d768f755

  • SSDEEP

    3072:5At7kEc9xTQyjv0TblKBF05HOu0ay/M3V9h2HxetxaA1j/dVcuBUA4VFrm5yUH:5s7wvQyjvelKbyH8UEHxEx53cuVQG

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_b979755ac86ec02de0068d1d873064ad9c6d73d5ae0ad5f70ebf48d56dfb3a59

    • Size

      286KB

    • MD5

      fb73d870e424a23443e73e0593b0ec46

    • SHA1

      17f76ce7d91f19c6030a1d457c72c7aba219d89b

    • SHA256

      b979755ac86ec02de0068d1d873064ad9c6d73d5ae0ad5f70ebf48d56dfb3a59

    • SHA512

      1e28f84c5b9d3a577416194f0d7c7cdcd8915a686e882df1e5261cd11d041865a05b44fe6d3a3c4ea4fa285f548ab88bdf82039cd1c41d799b871414d768f755

    • SSDEEP

      3072:5At7kEc9xTQyjv0TblKBF05HOu0ay/M3V9h2HxetxaA1j/dVcuBUA4VFrm5yUH:5s7wvQyjvelKbyH8UEHxEx53cuVQG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks