General

  • Target

    JaffaCakes118_c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d

  • Size

    184KB

  • Sample

    241224-dsejhazrcz

  • MD5

    4bf56f09203f49ce62a8bde95370b5e8

  • SHA1

    8c961cec6688e7ec733f21f85913aa72a6581759

  • SHA256

    c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d

  • SHA512

    d4ae50a9c80f8ccf334d3e4486d79242a38ad52dbc116d89e98f792f26a9f674b99b41116f9028171b6c9d6fbf138940b07c705db7137a2c3b7094b231aff396

  • SSDEEP

    3072:mXmEokfyWlUit95FAOslzEk7sQMXhIbRPsCPZPw3ZWrIUphgC:mbokaWn9oVJESpMhIb5lPS4

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d

    • Size

      184KB

    • MD5

      4bf56f09203f49ce62a8bde95370b5e8

    • SHA1

      8c961cec6688e7ec733f21f85913aa72a6581759

    • SHA256

      c11381c26c551893386bb1319dbd231e056120d76a9f19b31b2bdaafdd42889d

    • SHA512

      d4ae50a9c80f8ccf334d3e4486d79242a38ad52dbc116d89e98f792f26a9f674b99b41116f9028171b6c9d6fbf138940b07c705db7137a2c3b7094b231aff396

    • SSDEEP

      3072:mXmEokfyWlUit95FAOslzEk7sQMXhIbRPsCPZPw3ZWrIUphgC:mbokaWn9oVJESpMhIb5lPS4

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks