General

  • Target

    JaffaCakes118_ac640c150beb86b7a5dea208cdf187aadba828f7115ed2418ab06461a0ccfcc0

  • Size

    153KB

  • Sample

    241225-f566dsyrfp

  • MD5

    b4b463d7f677821bef88956f82e4acfe

  • SHA1

    e8b8e46d97fddabb2a1e3641b934ea82f7f84617

  • SHA256

    ac640c150beb86b7a5dea208cdf187aadba828f7115ed2418ab06461a0ccfcc0

  • SHA512

    ce0a47ddd139ddc927776b9925c194aa8ed22d91409d068674e2ebdb16956155e1d3169e46db97841047084ca552af89f6452244064f0e0883c86a73b58c8d73

  • SSDEEP

    3072:C7wDVf/TBmhfUU+68DF+uuUzs6HB571DL0O:C7wDVYhcUkFBz18O

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_ac640c150beb86b7a5dea208cdf187aadba828f7115ed2418ab06461a0ccfcc0

    • Size

      153KB

    • MD5

      b4b463d7f677821bef88956f82e4acfe

    • SHA1

      e8b8e46d97fddabb2a1e3641b934ea82f7f84617

    • SHA256

      ac640c150beb86b7a5dea208cdf187aadba828f7115ed2418ab06461a0ccfcc0

    • SHA512

      ce0a47ddd139ddc927776b9925c194aa8ed22d91409d068674e2ebdb16956155e1d3169e46db97841047084ca552af89f6452244064f0e0883c86a73b58c8d73

    • SSDEEP

      3072:C7wDVf/TBmhfUU+68DF+uuUzs6HB571DL0O:C7wDVYhcUkFBz18O

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks