General

  • Target

    JaffaCakes118_0003316589f3abf4ca7e307a0ec2527965aa117c90defb7125946ebd926886ef

  • Size

    241KB

  • Sample

    241225-qz1rjatrdw

  • MD5

    c6475e59ef21c4a191d2b0e3b5429960

  • SHA1

    c446c37461d9ac0c6d5ae79fe1c49e1d2584a81e

  • SHA256

    0003316589f3abf4ca7e307a0ec2527965aa117c90defb7125946ebd926886ef

  • SHA512

    c6e26c47dcf7f395058f86e62d5a7e8aae7a6fb87bf9e2feac8dd06927d25a69f68fbd71ffd965a8793dfeac65cd1824c4989cc0349594355ea207143ebf16c5

  • SSDEEP

    3072:c0GecS6S0PvgenevzaHWgtnu7F0kKUyo53YPwkQdaFg6JectfLMdB16NK1rnk:Ke7EQenCWHHnu1JYPR7FPJesfQf0U1

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_0003316589f3abf4ca7e307a0ec2527965aa117c90defb7125946ebd926886ef

    • Size

      241KB

    • MD5

      c6475e59ef21c4a191d2b0e3b5429960

    • SHA1

      c446c37461d9ac0c6d5ae79fe1c49e1d2584a81e

    • SHA256

      0003316589f3abf4ca7e307a0ec2527965aa117c90defb7125946ebd926886ef

    • SHA512

      c6e26c47dcf7f395058f86e62d5a7e8aae7a6fb87bf9e2feac8dd06927d25a69f68fbd71ffd965a8793dfeac65cd1824c4989cc0349594355ea207143ebf16c5

    • SSDEEP

      3072:c0GecS6S0PvgenevzaHWgtnu7F0kKUyo53YPwkQdaFg6JectfLMdB16NK1rnk:Ke7EQenCWHHnu1JYPR7FPJesfQf0U1

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks