General

  • Target

    JaffaCakes118_42c7ced62147af5b8cc31c12cf3ef7d75dddaa518bf3f2beb2c7ab5d9c5dd64f

  • Size

    240KB

  • Sample

    241224-x2vfvsvmhm

  • MD5

    ee14752b4ccb32769404996930ce3230

  • SHA1

    09190329105e182ba82701fa0f7a731e49d4a832

  • SHA256

    42c7ced62147af5b8cc31c12cf3ef7d75dddaa518bf3f2beb2c7ab5d9c5dd64f

  • SHA512

    15e5335cf214351f5ffb058fd8642018af62ed9e71f84ac42dc90d79f78755ac2d12abfc3716777ceaeb80cbc90a679cf32117741aa5e6d83e88a3a17763b264

  • SSDEEP

    3072:NXMJhiithleXQDIQMoCrjXm0a477yPY5tT7/iuiRNOuzUlDCtut:NIsCeADtmrjX+0n/iTRUxj

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_42c7ced62147af5b8cc31c12cf3ef7d75dddaa518bf3f2beb2c7ab5d9c5dd64f

    • Size

      240KB

    • MD5

      ee14752b4ccb32769404996930ce3230

    • SHA1

      09190329105e182ba82701fa0f7a731e49d4a832

    • SHA256

      42c7ced62147af5b8cc31c12cf3ef7d75dddaa518bf3f2beb2c7ab5d9c5dd64f

    • SHA512

      15e5335cf214351f5ffb058fd8642018af62ed9e71f84ac42dc90d79f78755ac2d12abfc3716777ceaeb80cbc90a679cf32117741aa5e6d83e88a3a17763b264

    • SSDEEP

      3072:NXMJhiithleXQDIQMoCrjXm0a477yPY5tT7/iuiRNOuzUlDCtut:NIsCeADtmrjX+0n/iTRUxj

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks