General

  • Target

    JaffaCakes118_15a870eac6cb77d63baeff768f82161e6e78fd82043c4b78baf7f7ff5b8513dd

  • Size

    284KB

  • Sample

    241226-z2xmbszrfm

  • MD5

    b41df6042d7fcfdc9bbfe3922271433f

  • SHA1

    986f1a17abc590ae702349ea8685d11c2ec27dd7

  • SHA256

    15a870eac6cb77d63baeff768f82161e6e78fd82043c4b78baf7f7ff5b8513dd

  • SHA512

    7076d94049a6b90e9e91ef486b0ed8d94108e26d520af6a8ac9de8e1b82706b0d01f1cab9e256c911e03e70e71bd370bffa3652cdc78af4756b28a7f47b77e1b

  • SSDEEP

    3072:H5yVL6SVHvyADnC4b1/w3Rf9qcRT9S20kesJ/MpKaVPmpujX1BWRQdmRfzt:ZyVGSBDnp1/wBfw42fVPwujWQd6f

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_15a870eac6cb77d63baeff768f82161e6e78fd82043c4b78baf7f7ff5b8513dd

    • Size

      284KB

    • MD5

      b41df6042d7fcfdc9bbfe3922271433f

    • SHA1

      986f1a17abc590ae702349ea8685d11c2ec27dd7

    • SHA256

      15a870eac6cb77d63baeff768f82161e6e78fd82043c4b78baf7f7ff5b8513dd

    • SHA512

      7076d94049a6b90e9e91ef486b0ed8d94108e26d520af6a8ac9de8e1b82706b0d01f1cab9e256c911e03e70e71bd370bffa3652cdc78af4756b28a7f47b77e1b

    • SSDEEP

      3072:H5yVL6SVHvyADnC4b1/w3Rf9qcRT9S20kesJ/MpKaVPmpujX1BWRQdmRfzt:ZyVGSBDnp1/wBfw42fVPwujWQd6f

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks