General

  • Target

    JaffaCakes118_b3973e6ed16787cb2d51305422f4c17de632b5b341071e8de87076da33cd787b

  • Size

    263KB

  • Sample

    241224-b99d4aykev

  • MD5

    c4d2d0ec862b673e31d2c1e60c6c07bf

  • SHA1

    29bd47351d69565013ce75c7f3adcad7f62e68a8

  • SHA256

    b3973e6ed16787cb2d51305422f4c17de632b5b341071e8de87076da33cd787b

  • SHA512

    25eac99833b31733e3e8c8f6b72ba8ef63d64e7465a947716e49ccdfa60e3347d3b970e6c660b3dbb9aab693b8df7de4a38a605aecc7c6c351a33746a987b0ea

  • SSDEEP

    6144:uvxGxGgf8Ji8E7ZhHJB+Z/IaESeA5VsXhe0TQ2sc9hdShr:uZkff8JiV7ZhrwIaESBDsXUcQlOmJ

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_b3973e6ed16787cb2d51305422f4c17de632b5b341071e8de87076da33cd787b

    • Size

      263KB

    • MD5

      c4d2d0ec862b673e31d2c1e60c6c07bf

    • SHA1

      29bd47351d69565013ce75c7f3adcad7f62e68a8

    • SHA256

      b3973e6ed16787cb2d51305422f4c17de632b5b341071e8de87076da33cd787b

    • SHA512

      25eac99833b31733e3e8c8f6b72ba8ef63d64e7465a947716e49ccdfa60e3347d3b970e6c660b3dbb9aab693b8df7de4a38a605aecc7c6c351a33746a987b0ea

    • SSDEEP

      6144:uvxGxGgf8Ji8E7ZhHJB+Z/IaESeA5VsXhe0TQ2sc9hdShr:uZkff8JiV7ZhrwIaESBDsXUcQlOmJ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks