General

  • Target

    JaffaCakes118_14f8fa28672ea9855850971b617fe07bc1a14951383cc007597da1bf39f729e5

  • Size

    289KB

  • Sample

    241226-xb231svkax

  • MD5

    dc63e7f378971c17563a3e8d31f96796

  • SHA1

    eaa44f139916dc418d7b80eb87d1352a45cac953

  • SHA256

    14f8fa28672ea9855850971b617fe07bc1a14951383cc007597da1bf39f729e5

  • SHA512

    0b1919c8f286011c23501b5d0f72934822931fa77602152b5a4b6825362ae3988ad82b6911f288639fe7f139febf894e1adde964d24494298ae3e7f474883b36

  • SSDEEP

    6144:2Ep3TtJj54f9/KcWqJL606yROOhxxdeTr/ekI:Z14f9FL6kzxd6L

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_14f8fa28672ea9855850971b617fe07bc1a14951383cc007597da1bf39f729e5

    • Size

      289KB

    • MD5

      dc63e7f378971c17563a3e8d31f96796

    • SHA1

      eaa44f139916dc418d7b80eb87d1352a45cac953

    • SHA256

      14f8fa28672ea9855850971b617fe07bc1a14951383cc007597da1bf39f729e5

    • SHA512

      0b1919c8f286011c23501b5d0f72934822931fa77602152b5a4b6825362ae3988ad82b6911f288639fe7f139febf894e1adde964d24494298ae3e7f474883b36

    • SSDEEP

      6144:2Ep3TtJj54f9/KcWqJL606yROOhxxdeTr/ekI:Z14f9FL6kzxd6L

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks