General

  • Target

    JaffaCakes118_a0d8d5274a90022480fa0b8f55b2e072eddd6287a2f12d77b0555062d33c970a

  • Size

    236KB

  • Sample

    241225-q2n6hstrgz

  • MD5

    7679009858a84abb6a9ec42accbf6733

  • SHA1

    48b898b42380444677620354c9a1fa26de3d22e5

  • SHA256

    a0d8d5274a90022480fa0b8f55b2e072eddd6287a2f12d77b0555062d33c970a

  • SHA512

    80f9aee782c84f7242b2e5eac8d24d7274b2b29ad80a56f9bfee6017cd2ecf88de23625cfd0037bc27507e9a0c43884c29c8471b4c10f9d7e0d525ed7aaacdc6

  • SSDEEP

    6144:coD6bWHeHdjZXhTjBlL02Xu9zxK4HZmkMkmKZWzg:c6L+9jFhr02Xuxk0ZUKo

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_a0d8d5274a90022480fa0b8f55b2e072eddd6287a2f12d77b0555062d33c970a

    • Size

      236KB

    • MD5

      7679009858a84abb6a9ec42accbf6733

    • SHA1

      48b898b42380444677620354c9a1fa26de3d22e5

    • SHA256

      a0d8d5274a90022480fa0b8f55b2e072eddd6287a2f12d77b0555062d33c970a

    • SHA512

      80f9aee782c84f7242b2e5eac8d24d7274b2b29ad80a56f9bfee6017cd2ecf88de23625cfd0037bc27507e9a0c43884c29c8471b4c10f9d7e0d525ed7aaacdc6

    • SSDEEP

      6144:coD6bWHeHdjZXhTjBlL02Xu9zxK4HZmkMkmKZWzg:c6L+9jFhr02Xuxk0ZUKo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks