General

  • Target

    JaffaCakes118_c95de79d76a72a2b6ce211f6a626f575a5f6df83726a25acb84ebf3d095650a2

  • Size

    290KB

  • Sample

    241225-v32v8a1jak

  • MD5

    e758d3f8e1a43e4b8fd0c982394216a0

  • SHA1

    b8713215a45d83019881f18215f044bac9073a4f

  • SHA256

    c95de79d76a72a2b6ce211f6a626f575a5f6df83726a25acb84ebf3d095650a2

  • SHA512

    fd099504787bf3644253ea503cc742ad07fb1abfc96524649137050c9f597950a0686749df76a6afcf54698d7cfe91d24e6062d1f99132b784b9ffac0357493f

  • SSDEEP

    6144:cKda0k5CPY6+hdbbIPyISpx+dGYIS2oWPfG/5J:cK2cPP+hdbbIapKt2O

Malware Config

Extracted

Family

tofsee

C2

niflheimr.cn

jotunheim.name

Targets

    • Target

      JaffaCakes118_c95de79d76a72a2b6ce211f6a626f575a5f6df83726a25acb84ebf3d095650a2

    • Size

      290KB

    • MD5

      e758d3f8e1a43e4b8fd0c982394216a0

    • SHA1

      b8713215a45d83019881f18215f044bac9073a4f

    • SHA256

      c95de79d76a72a2b6ce211f6a626f575a5f6df83726a25acb84ebf3d095650a2

    • SHA512

      fd099504787bf3644253ea503cc742ad07fb1abfc96524649137050c9f597950a0686749df76a6afcf54698d7cfe91d24e6062d1f99132b784b9ffac0357493f

    • SSDEEP

      6144:cKda0k5CPY6+hdbbIPyISpx+dGYIS2oWPfG/5J:cK2cPP+hdbbIapKt2O

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks