General

  • Target

    JaffaCakes118_f333a0be1d5c870dec819b2f818c6fb69c01a435e9fc54ce9102809fca9469b0

  • Size

    133KB

  • Sample

    241224-1dletsxqey

  • MD5

    78536b258fabfef679932529b1d60d0b

  • SHA1

    613cd544702b961e6eda24664a07a65a9c864472

  • SHA256

    f333a0be1d5c870dec819b2f818c6fb69c01a435e9fc54ce9102809fca9469b0

  • SHA512

    3dbe069fabd08a686cea32d4ae15b7cd0aa9250863cc8b9352da4192b9a203c96d6b7844760d87ed5a265bd1cfc4374a76f615542f7b440ad510c1c1caf008e4

  • SSDEEP

    3072:VsXNUohGPlmxPhDu+RWJg9823jIRzixggPYg0/07T:wNhcPUCauG8u0ePPYgKI

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      c801719a85627afbece42c8eefba84f6d56957d0f17381b5d464234621aee411

    • Size

      265KB

    • MD5

      398239e317f655000598f69007041f16

    • SHA1

      78e59ccc2a557308c64de915d1165149b1da2f1e

    • SHA256

      c801719a85627afbece42c8eefba84f6d56957d0f17381b5d464234621aee411

    • SHA512

      7e9868cf2508c749c1917e252fdf1bb6abb4e2d895765fe48612492cdfc6888098760e48a0a0eacbb784f092d1ceb7ecf3550ed69cd91267500cf8da4ae42667

    • SSDEEP

      3072:YsNl37q7cp+RWJg986U7Ti5NVggjcGkNIVqIOM/h3sRH4KA:RH7q7cpauG8h7m7ITsqxLE

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks