General

  • Target

    JaffaCakes118_72f0323499a3831dcbc7d9d558143b12a44beadcd7d61ecc37512e31fd357d2c

  • Size

    283KB

  • Sample

    241225-ztr2waxqcq

  • MD5

    64561281dec56eb90a6d09c136fe247c

  • SHA1

    90abc8a42cc24d16c9b3d5f7b768b5be8df9cb3e

  • SHA256

    72f0323499a3831dcbc7d9d558143b12a44beadcd7d61ecc37512e31fd357d2c

  • SHA512

    4a9dec99567ea12dbf089844343911920a7a1a55337f9b2e4c5ce8d134523dfc3d232f1030a0121724414e2aafb49f4df13377c9a6cf29fbfca8f6eb0694ed4c

  • SSDEEP

    3072:k0Pk78X7od3gwQTyrZ6bA5VKtxjm/z0o3/ycngVYseLzSOgxw5aGCTZGa9yXgGgy:D878A3QBbA3Exw5o6yOH9k79kgGpeU

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_72f0323499a3831dcbc7d9d558143b12a44beadcd7d61ecc37512e31fd357d2c

    • Size

      283KB

    • MD5

      64561281dec56eb90a6d09c136fe247c

    • SHA1

      90abc8a42cc24d16c9b3d5f7b768b5be8df9cb3e

    • SHA256

      72f0323499a3831dcbc7d9d558143b12a44beadcd7d61ecc37512e31fd357d2c

    • SHA512

      4a9dec99567ea12dbf089844343911920a7a1a55337f9b2e4c5ce8d134523dfc3d232f1030a0121724414e2aafb49f4df13377c9a6cf29fbfca8f6eb0694ed4c

    • SSDEEP

      3072:k0Pk78X7od3gwQTyrZ6bA5VKtxjm/z0o3/ycngVYseLzSOgxw5aGCTZGa9yXgGgy:D878A3QBbA3Exw5o6yOH9k79kgGpeU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks