General

  • Target

    JaffaCakes118_27d3fec7629071d5ce9122d2c729f5afbf1c5c0308cf44f32423ece8a6160cb0

  • Size

    331KB

  • Sample

    241227-a9pt1sxkdr

  • MD5

    02048a10ea697604d4afca796a0ab93b

  • SHA1

    fe06af1d3e80afcdce458a0d7bb2ee62b1533141

  • SHA256

    27d3fec7629071d5ce9122d2c729f5afbf1c5c0308cf44f32423ece8a6160cb0

  • SHA512

    e25d88f3a9837eaa5d7732950db48b2cf9ccacb4c72fc35165daf31a74dad799c09a29adb281ca1c995ba4a43e844275a2c6fe9fcf1f6a1d062fe9b2127f36fb

  • SSDEEP

    6144:F7+WqgwH1pbCLYCdNyZMQsyOlimfkkJaw:F6uu1pbCL90ZMQfrUjaw

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      JaffaCakes118_27d3fec7629071d5ce9122d2c729f5afbf1c5c0308cf44f32423ece8a6160cb0

    • Size

      331KB

    • MD5

      02048a10ea697604d4afca796a0ab93b

    • SHA1

      fe06af1d3e80afcdce458a0d7bb2ee62b1533141

    • SHA256

      27d3fec7629071d5ce9122d2c729f5afbf1c5c0308cf44f32423ece8a6160cb0

    • SHA512

      e25d88f3a9837eaa5d7732950db48b2cf9ccacb4c72fc35165daf31a74dad799c09a29adb281ca1c995ba4a43e844275a2c6fe9fcf1f6a1d062fe9b2127f36fb

    • SSDEEP

      6144:F7+WqgwH1pbCLYCdNyZMQsyOlimfkkJaw:F6uu1pbCL90ZMQfrUjaw

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks