General

  • Target

    JaffaCakes118_c837cd078824befc2f5bcd696d0b7eece7c6ef2b706bc5332d5b1155aac06531

  • Size

    270KB

  • Sample

    241224-1d3n4sxqfx

  • MD5

    4572e49963d2e5a2f834c3f66647c313

  • SHA1

    5133ea013005b1867d964c1c7b68ae9919c11a60

  • SHA256

    c837cd078824befc2f5bcd696d0b7eece7c6ef2b706bc5332d5b1155aac06531

  • SHA512

    f200d03c74068ef8afdb4d69b8e145806c4dcab3c46ebef9f101ee4cf15faafde8107d302033e71ec785e21e47c9a407f68d89bc3aefdd8135ac02e6150c4d38

  • SSDEEP

    6144:VlKUqyUmgpzhSMzmZqIPFphSn0zl19pDJH:fwyUmyAKn0B19b

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_c837cd078824befc2f5bcd696d0b7eece7c6ef2b706bc5332d5b1155aac06531

    • Size

      270KB

    • MD5

      4572e49963d2e5a2f834c3f66647c313

    • SHA1

      5133ea013005b1867d964c1c7b68ae9919c11a60

    • SHA256

      c837cd078824befc2f5bcd696d0b7eece7c6ef2b706bc5332d5b1155aac06531

    • SHA512

      f200d03c74068ef8afdb4d69b8e145806c4dcab3c46ebef9f101ee4cf15faafde8107d302033e71ec785e21e47c9a407f68d89bc3aefdd8135ac02e6150c4d38

    • SSDEEP

      6144:VlKUqyUmgpzhSMzmZqIPFphSn0zl19pDJH:fwyUmyAKn0B19b

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks