General

  • Target

    JaffaCakes118_2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8

  • Size

    242KB

  • Sample

    241224-3ytm2s1mb1

  • MD5

    7b3d80fc9558e0087f546c82f87b3810

  • SHA1

    794832d367e44686dc9488fd342d5f6959c730ab

  • SHA256

    2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8

  • SHA512

    0cd3a0f366e006476355a8a8e09d6558a894ed01b071717730cb921315caa1ac4a85bcff1c28f91d78d81b4b6e1be661eb17b25c83ec9e4fb0fc26b9dfa15e3f

  • SSDEEP

    6144:RvD9GxJa8fWFe/3T808AnaTpzNjMlO5FeT:BD9ka8f+e/LhnaFzNjM+e

Malware Config

Extracted

Family

tofsee

C2

niflheimr.cn

jotunheim.name

Targets

    • Target

      JaffaCakes118_2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8

    • Size

      242KB

    • MD5

      7b3d80fc9558e0087f546c82f87b3810

    • SHA1

      794832d367e44686dc9488fd342d5f6959c730ab

    • SHA256

      2a761bb12b50dc7ab5f4b6d5b8ab1c3f17d3f1d39f4fe26e3fe4a3cde21c89d8

    • SHA512

      0cd3a0f366e006476355a8a8e09d6558a894ed01b071717730cb921315caa1ac4a85bcff1c28f91d78d81b4b6e1be661eb17b25c83ec9e4fb0fc26b9dfa15e3f

    • SSDEEP

      6144:RvD9GxJa8fWFe/3T808AnaTpzNjMlO5FeT:BD9ka8f+e/LhnaFzNjM+e

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks