General

  • Target

    JaffaCakes118_bb24d12fa50e680ede3fc873bbec9b08ff9f855c9f66f1fe404e41ecbc5cc048

  • Size

    233KB

  • Sample

    241224-1j7j9aykck

  • MD5

    d8961898d3975db92f158c4ff70fff57

  • SHA1

    591f965bbb3222b40daff85fd859fb6844ded151

  • SHA256

    bb24d12fa50e680ede3fc873bbec9b08ff9f855c9f66f1fe404e41ecbc5cc048

  • SHA512

    4e31f4c36680bfcaec5a1d036592c92581be9c70a08a9a285755daa2319ca9f38911176f151ed51f347b4dd9b9fb5159385540ac02d3fa4d358a4d85467cb9a2

  • SSDEEP

    6144:4c8ikuMSSqBZbH7HOBPyIyf44V+qrLQTl+0i23GUZ:4c8ikvSvZbHTMkdV+yLQBiaG8

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_bb24d12fa50e680ede3fc873bbec9b08ff9f855c9f66f1fe404e41ecbc5cc048

    • Size

      233KB

    • MD5

      d8961898d3975db92f158c4ff70fff57

    • SHA1

      591f965bbb3222b40daff85fd859fb6844ded151

    • SHA256

      bb24d12fa50e680ede3fc873bbec9b08ff9f855c9f66f1fe404e41ecbc5cc048

    • SHA512

      4e31f4c36680bfcaec5a1d036592c92581be9c70a08a9a285755daa2319ca9f38911176f151ed51f347b4dd9b9fb5159385540ac02d3fa4d358a4d85467cb9a2

    • SSDEEP

      6144:4c8ikuMSSqBZbH7HOBPyIyf44V+qrLQTl+0i23GUZ:4c8ikvSvZbHTMkdV+yLQBiaG8

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks