General

  • Target

    JaffaCakes118_3c4fd17000293eb607581d749e88e41ac031464f9752e8bee38c5f09713ef14f

  • Size

    243KB

  • Sample

    241225-1611zszldz

  • MD5

    5bec809283e0c01e1992ead19a369ff7

  • SHA1

    4885c08dc92d4c9ce5f5851d41626d5bdd84504d

  • SHA256

    3c4fd17000293eb607581d749e88e41ac031464f9752e8bee38c5f09713ef14f

  • SHA512

    3918e327a4bd7c75de753c2988e3d1af735168a995d4a5f05a7469e2694c104f6bd1d5c22a22d1b1fa167344c75041ea3fec87681c6becd620905138629354a2

  • SSDEEP

    6144:ogZQpRhZlXC496tu87b7PYJVWs6b4B3D3lcxx:HZsXC496T7P+Qb4BTex

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_3c4fd17000293eb607581d749e88e41ac031464f9752e8bee38c5f09713ef14f

    • Size

      243KB

    • MD5

      5bec809283e0c01e1992ead19a369ff7

    • SHA1

      4885c08dc92d4c9ce5f5851d41626d5bdd84504d

    • SHA256

      3c4fd17000293eb607581d749e88e41ac031464f9752e8bee38c5f09713ef14f

    • SHA512

      3918e327a4bd7c75de753c2988e3d1af735168a995d4a5f05a7469e2694c104f6bd1d5c22a22d1b1fa167344c75041ea3fec87681c6becd620905138629354a2

    • SSDEEP

      6144:ogZQpRhZlXC496tu87b7PYJVWs6b4B3D3lcxx:HZsXC496T7P+Qb4BTex

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks