General

  • Target

    JaffaCakes118_7ff382e6f4a20363a66f99a385dfbb9782b8cd43eaf17cc23b50335d8c543f5f

  • Size

    286KB

  • Sample

    241225-ts9yeaxrdz

  • MD5

    96b93fb34c985b30f50a7735db22d92b

  • SHA1

    eb448242fffcf293b089256666eee9e3dd0ceeb0

  • SHA256

    7ff382e6f4a20363a66f99a385dfbb9782b8cd43eaf17cc23b50335d8c543f5f

  • SHA512

    07765d1431359a6537fb9f706678eddb0009b693fa6139034e9f5c7b14a32ac0ddedd3c5598287ade40d866a60487f73f65f6aba0ddccdd18757f89096be51bb

  • SSDEEP

    3072:YB0lRYwSYUx98sfyN79u9nlGlkD5WPOrcPI1Ze1+eZORI88EuSYG5RHZFS4Ez:YB6fSYUxEN7lkkPQcPI1NK+buSYG5RG

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_7ff382e6f4a20363a66f99a385dfbb9782b8cd43eaf17cc23b50335d8c543f5f

    • Size

      286KB

    • MD5

      96b93fb34c985b30f50a7735db22d92b

    • SHA1

      eb448242fffcf293b089256666eee9e3dd0ceeb0

    • SHA256

      7ff382e6f4a20363a66f99a385dfbb9782b8cd43eaf17cc23b50335d8c543f5f

    • SHA512

      07765d1431359a6537fb9f706678eddb0009b693fa6139034e9f5c7b14a32ac0ddedd3c5598287ade40d866a60487f73f65f6aba0ddccdd18757f89096be51bb

    • SSDEEP

      3072:YB0lRYwSYUx98sfyN79u9nlGlkD5WPOrcPI1Ze1+eZORI88EuSYG5RHZFS4Ez:YB6fSYUxEN7lkkPQcPI1NK+buSYG5RG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks