General

  • Target

    JaffaCakes118_bd4d0182cbd50f08d157f51f241c28b6645982d32dd1dd30a8c78e121d85726e

  • Size

    285KB

  • Sample

    241225-bty87atkhk

  • MD5

    25c149a1f5f4a036ebb72773167bedff

  • SHA1

    b431e0f8cc073569c13889b0a4a13a982f47573a

  • SHA256

    bd4d0182cbd50f08d157f51f241c28b6645982d32dd1dd30a8c78e121d85726e

  • SHA512

    6dfb3c62eb5c2f781da664db27b4821e3fca799b3d1a09825be1ace7a7ba9290fa06d2e7cb2867b1aefc7d88547539c2580ad1d7d016e93ac753b0fe08e3f63c

  • SSDEEP

    6144:IW+6iIKmVsp07lkCPkcPI1NSIuSYG5RG:NVTCkI1YnG+

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_bd4d0182cbd50f08d157f51f241c28b6645982d32dd1dd30a8c78e121d85726e

    • Size

      285KB

    • MD5

      25c149a1f5f4a036ebb72773167bedff

    • SHA1

      b431e0f8cc073569c13889b0a4a13a982f47573a

    • SHA256

      bd4d0182cbd50f08d157f51f241c28b6645982d32dd1dd30a8c78e121d85726e

    • SHA512

      6dfb3c62eb5c2f781da664db27b4821e3fca799b3d1a09825be1ace7a7ba9290fa06d2e7cb2867b1aefc7d88547539c2580ad1d7d016e93ac753b0fe08e3f63c

    • SSDEEP

      6144:IW+6iIKmVsp07lkCPkcPI1NSIuSYG5RG:NVTCkI1YnG+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks