General

  • Target

    JaffaCakes118_8c65c06a996ac6862230624679911918f188155112aadc288b8453f4f629c6ff

  • Size

    171KB

  • Sample

    241226-3mve7svnbt

  • MD5

    9af3daed34da9dc3e52e2077c3555254

  • SHA1

    ab8398f41b46c49cedf0b24105e12cfaec72e4b1

  • SHA256

    8c65c06a996ac6862230624679911918f188155112aadc288b8453f4f629c6ff

  • SHA512

    29fd5e1f415cfa6fbc1a812b91fd1831f8c7bb6de44fe5916b06822a8c756a382a5b0ee8cfd4a2140d5e1b3b32e3c8ca8109d7ea236018bbbcea240c7ad3784d

  • SSDEEP

    3072:Ax5OhBrEymQOe0dGeqnJxwyBKXQryg/4n0nQwHPNEGo7LUXwKR3+EPJ1o7t:AcN9LO7GoyBcFI4yVEvoAU3lPzoJ

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      3db9a9633bb3097ee7f34cd85bbc168ed3a59496c0c407cf1d22087d58fa2763

    • Size

      293KB

    • MD5

      e51a053134034365f39714c782c36a93

    • SHA1

      91e470527e6df4a7d90da44c6d56768dae7eb85d

    • SHA256

      3db9a9633bb3097ee7f34cd85bbc168ed3a59496c0c407cf1d22087d58fa2763

    • SHA512

      4702b88bae5a39d1eefa49d1b2ea6113be5190120791b48d08073804929ee4d1391fbe6eb1191af8f62995c2188219c27f28e35600faeeaf7663397d71e9fd90

    • SSDEEP

      6144:lBapH7MbNv/ALBKBCO4XS2y9EJS6GJIf9I48jVRoM7gn4:Hu7MbloLYAO4XS2y+eo8VRTk4

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks