General

  • Target

    JaffaCakes118_1088b645163d16ec86ee0a3ec11de3157d364cdcebce858a105520644f9011da

  • Size

    287KB

  • Sample

    241226-3ypdbsvrew

  • MD5

    d719adb465300da4191335157512911a

  • SHA1

    83d8620cfceb89a872c91e7b2556e256f6d0b1bc

  • SHA256

    1088b645163d16ec86ee0a3ec11de3157d364cdcebce858a105520644f9011da

  • SHA512

    da62eee9cadb8041e67578582516da8c5852ccc1e07bd303ae1101e3f0e35bae89d5edf7f7883147131b08f2ff6908d2542c2f8dd337d016120c927de8c354e0

  • SSDEEP

    3072:TtqVySHUVjW3ji9JHzlay9X5PVr6u0ay/MD3aiGKeVveyc4QbvmVYVjIR8oaPAAj:TtCybs3jinTlaCJPeNZ1elWYVU6aPQN

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_1088b645163d16ec86ee0a3ec11de3157d364cdcebce858a105520644f9011da

    • Size

      287KB

    • MD5

      d719adb465300da4191335157512911a

    • SHA1

      83d8620cfceb89a872c91e7b2556e256f6d0b1bc

    • SHA256

      1088b645163d16ec86ee0a3ec11de3157d364cdcebce858a105520644f9011da

    • SHA512

      da62eee9cadb8041e67578582516da8c5852ccc1e07bd303ae1101e3f0e35bae89d5edf7f7883147131b08f2ff6908d2542c2f8dd337d016120c927de8c354e0

    • SSDEEP

      3072:TtqVySHUVjW3ji9JHzlay9X5PVr6u0ay/MD3aiGKeVveyc4QbvmVYVjIR8oaPAAj:TtCybs3jinTlaCJPeNZ1elWYVU6aPQN

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks