General

  • Target

    JaffaCakes118_bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79

  • Size

    332KB

  • Sample

    241224-yxe12swlhs

  • MD5

    5cae962bf42ceb89add6497fb5fa455e

  • SHA1

    bb28f06eeac89f3a38f9d5271c9cc121e94405ec

  • SHA256

    bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79

  • SHA512

    5a5e617152397ee13bae1d08983b9fdb4a0225369fea720ad01d9be5f5fcb8062103f65bdc1175b8db0a5f387b20470ea099fc8d0c3d5f37866c8606c57ff0cc

  • SSDEEP

    6144:Hq80kju85cYfPli8mrak7BKQVKnaQ5ewuqHxxgNu:Hh0AugcsPli8mrak9KQgnaQju8x

Malware Config

Extracted

Family

tofsee

C2

mubrikych.top

oxxyfix.xyz

Targets

    • Target

      JaffaCakes118_bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79

    • Size

      332KB

    • MD5

      5cae962bf42ceb89add6497fb5fa455e

    • SHA1

      bb28f06eeac89f3a38f9d5271c9cc121e94405ec

    • SHA256

      bf1529d684825accdb60acd5f6f8fbe6bc819a705dcda07dd4f565fffdd46b79

    • SHA512

      5a5e617152397ee13bae1d08983b9fdb4a0225369fea720ad01d9be5f5fcb8062103f65bdc1175b8db0a5f387b20470ea099fc8d0c3d5f37866c8606c57ff0cc

    • SSDEEP

      6144:Hq80kju85cYfPli8mrak7BKQVKnaQ5ewuqHxxgNu:Hh0AugcsPli8mrak9KQgnaQju8x

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks