General

  • Target

    JaffaCakes118_1fd9a5cd4b99aa127df418c91d64587722d645403a50bbfd577591e1d7fceb36

  • Size

    262KB

  • Sample

    241225-z32mnsxqa1

  • MD5

    4ee647771485ffc9848991a8cba8f527

  • SHA1

    7c0ebf75d310c5725db233f6e67f923d526d68b5

  • SHA256

    1fd9a5cd4b99aa127df418c91d64587722d645403a50bbfd577591e1d7fceb36

  • SHA512

    9b93bd56dfa68a9cbec621b879d48fe2d093e84a924f92400f454ddfe0b39e9ed919e4b0918e1a31c2754110556c130b05d0b604d7eefa4ace39ec5dfe6b5f81

  • SSDEEP

    6144:Bw4If8y3w4qjCACIrdYf6K5OCacgsP+19G4oVG+EwnGS:Bw4IEyvqjCAnriCK50cgs+1ERGsnG

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_1fd9a5cd4b99aa127df418c91d64587722d645403a50bbfd577591e1d7fceb36

    • Size

      262KB

    • MD5

      4ee647771485ffc9848991a8cba8f527

    • SHA1

      7c0ebf75d310c5725db233f6e67f923d526d68b5

    • SHA256

      1fd9a5cd4b99aa127df418c91d64587722d645403a50bbfd577591e1d7fceb36

    • SHA512

      9b93bd56dfa68a9cbec621b879d48fe2d093e84a924f92400f454ddfe0b39e9ed919e4b0918e1a31c2754110556c130b05d0b604d7eefa4ace39ec5dfe6b5f81

    • SSDEEP

      6144:Bw4If8y3w4qjCACIrdYf6K5OCacgsP+19G4oVG+EwnGS:Bw4IEyvqjCAnriCK50cgs+1ERGsnG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks