General

  • Target

    JaffaCakes118_1de61f619fa0533fb1b90d506d18b80b49d738264d2d96822c8600a696a2546f

  • Size

    277KB

  • Sample

    241224-sh5p9szpat

  • MD5

    886521f6b302733ec56fa74e9eee797c

  • SHA1

    426770987d11b12e6b9709a7064a143e39a2adbc

  • SHA256

    1de61f619fa0533fb1b90d506d18b80b49d738264d2d96822c8600a696a2546f

  • SHA512

    a267361d9f84755a8346a303c3ea7f65ee6b7a721c124fe12ba67531509d3ad2d9c3cf6f35fc0b29922f619e8f4a96895c29305c91894a476023fb508a5a01d9

  • SSDEEP

    3072:Hdh4rj43qHj/zjgRYR6lVatBLufQxMmYq7sxkgaBCh:f4rj46/zjgRI2atBLTMYQiga

Malware Config

Extracted

Family

tofsee

C2

niflheimr.cn

jotunheim.name

Targets

    • Target

      JaffaCakes118_1de61f619fa0533fb1b90d506d18b80b49d738264d2d96822c8600a696a2546f

    • Size

      277KB

    • MD5

      886521f6b302733ec56fa74e9eee797c

    • SHA1

      426770987d11b12e6b9709a7064a143e39a2adbc

    • SHA256

      1de61f619fa0533fb1b90d506d18b80b49d738264d2d96822c8600a696a2546f

    • SHA512

      a267361d9f84755a8346a303c3ea7f65ee6b7a721c124fe12ba67531509d3ad2d9c3cf6f35fc0b29922f619e8f4a96895c29305c91894a476023fb508a5a01d9

    • SSDEEP

      3072:Hdh4rj43qHj/zjgRYR6lVatBLufQxMmYq7sxkgaBCh:f4rj46/zjgRI2atBLTMYQiga

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks