General

  • Target

    JaffaCakes118_8f174ea90273feb2f39e1c72f9f56a3c9a1b90ff2cbeb235817a0fb454bb8875

  • Size

    154KB

  • Sample

    241225-arftds1rfy

  • MD5

    07d39bc6ccb9cdea500fd8d175b74c67

  • SHA1

    b2e40b713608cce63c15b581feff213dc87954bb

  • SHA256

    8f174ea90273feb2f39e1c72f9f56a3c9a1b90ff2cbeb235817a0fb454bb8875

  • SHA512

    907fa8db9a50c94deb74fc221743bb3c781cc8b9bb9128d15ed789776a93fa345ec60d1a1edc6567d4a569eb3dd6879fcbbeb64babe587d2e2b280d6c78945f9

  • SSDEEP

    3072:KzamdKU4X+INwWgwLZMtUo5iOCuNNV00OHz:KzldKT+KwWgwl+7VN/OT

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_8f174ea90273feb2f39e1c72f9f56a3c9a1b90ff2cbeb235817a0fb454bb8875

    • Size

      154KB

    • MD5

      07d39bc6ccb9cdea500fd8d175b74c67

    • SHA1

      b2e40b713608cce63c15b581feff213dc87954bb

    • SHA256

      8f174ea90273feb2f39e1c72f9f56a3c9a1b90ff2cbeb235817a0fb454bb8875

    • SHA512

      907fa8db9a50c94deb74fc221743bb3c781cc8b9bb9128d15ed789776a93fa345ec60d1a1edc6567d4a569eb3dd6879fcbbeb64babe587d2e2b280d6c78945f9

    • SSDEEP

      3072:KzamdKU4X+INwWgwLZMtUo5iOCuNNV00OHz:KzldKT+KwWgwl+7VN/OT

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks