General

  • Target

    JaffaCakes118_9f7e3c133fda9173878f3a1c3a63925a82a2cb868409ac5aacd4f92d8c94911a

  • Size

    167KB

  • Sample

    241224-pt342axmdw

  • MD5

    0549a72976da108addc3768d017139c9

  • SHA1

    47234f5fd7e7887e31f138c70a54968a91d81a81

  • SHA256

    9f7e3c133fda9173878f3a1c3a63925a82a2cb868409ac5aacd4f92d8c94911a

  • SHA512

    d31cbc2263649268b38303811c40daee1651f4562d76face85a526e32ba340d75e7fcea695c4c83d19c7b840f38e5e9465bfce350e4dd8b5cf4fa6aacd874ff4

  • SSDEEP

    3072:CcLgGzlfz8/TpIdGVTLwC25gOPU68zB3fBx/S9H6dYs:3rB+/TEwz5z/Ead

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_9f7e3c133fda9173878f3a1c3a63925a82a2cb868409ac5aacd4f92d8c94911a

    • Size

      167KB

    • MD5

      0549a72976da108addc3768d017139c9

    • SHA1

      47234f5fd7e7887e31f138c70a54968a91d81a81

    • SHA256

      9f7e3c133fda9173878f3a1c3a63925a82a2cb868409ac5aacd4f92d8c94911a

    • SHA512

      d31cbc2263649268b38303811c40daee1651f4562d76face85a526e32ba340d75e7fcea695c4c83d19c7b840f38e5e9465bfce350e4dd8b5cf4fa6aacd874ff4

    • SSDEEP

      3072:CcLgGzlfz8/TpIdGVTLwC25gOPU68zB3fBx/S9H6dYs:3rB+/TEwz5z/Ead

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks