General

  • Target

    JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492

  • Size

    175KB

  • Sample

    241225-axavbsskav

  • MD5

    a3e8a4ea8c06001b1d17198c38505e74

  • SHA1

    fc87f5b0f5bd9448ac169693cac4e89af11cdd4c

  • SHA256

    bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492

  • SHA512

    294c00df759e3631ab6607afac25c15ae70eabd8cd68dffe4c921f6af6f06cb668989688d13c256c8e33fe0ae437273c48309e95b7c8782fe06baf5be0bbc51b

  • SSDEEP

    3072:nODfLSAVPUAMY9e2r6JGH71FXvTGGPCUWk0+WrxpzbgqruT9s9TbB:nODfLFUAMOcGXvzCF+uzbgwuT0B

Malware Config

Extracted

Family

tofsee

C2

mubrikych.top

oxxyfix.xyz

Targets

    • Target

      JaffaCakes118_bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492

    • Size

      175KB

    • MD5

      a3e8a4ea8c06001b1d17198c38505e74

    • SHA1

      fc87f5b0f5bd9448ac169693cac4e89af11cdd4c

    • SHA256

      bda60b16925bf018562a18270e5ef72490a74284ebfd2ff90d0d55260b97b492

    • SHA512

      294c00df759e3631ab6607afac25c15ae70eabd8cd68dffe4c921f6af6f06cb668989688d13c256c8e33fe0ae437273c48309e95b7c8782fe06baf5be0bbc51b

    • SSDEEP

      3072:nODfLSAVPUAMY9e2r6JGH71FXvTGGPCUWk0+WrxpzbgqruT9s9TbB:nODfLFUAMOcGXvzCF+uzbgwuT0B

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks