General

  • Target

    JaffaCakes118_d5daf114f9b2952ea9b1a8a5dc001080158d48cc394b657331f642983d1ce0b1

  • Size

    284KB

  • Sample

    241227-cfehasypcp

  • MD5

    7d00be4ec65386f955765f985e6f674c

  • SHA1

    3f0aa8c7fd4d8d40bec0399f98f3fa2db5f90a32

  • SHA256

    d5daf114f9b2952ea9b1a8a5dc001080158d48cc394b657331f642983d1ce0b1

  • SHA512

    0fc70c2af038fb7922dffdd804d6234914459a2ba8a90eaf356232a80528e67b4c719f66d1b0664008308f0368fcb2e889aab7f9e27864b7c516c28f3acb5a1f

  • SSDEEP

    6144:WLiJZN+SN48a0qkz6LJ4PKNhEYUVP4Mu:nr+w48aB26NHXEYU

Malware Config

Extracted

Family

tofsee

C2

mubrikych.top

oxxyfix.xyz

Targets

    • Target

      JaffaCakes118_d5daf114f9b2952ea9b1a8a5dc001080158d48cc394b657331f642983d1ce0b1

    • Size

      284KB

    • MD5

      7d00be4ec65386f955765f985e6f674c

    • SHA1

      3f0aa8c7fd4d8d40bec0399f98f3fa2db5f90a32

    • SHA256

      d5daf114f9b2952ea9b1a8a5dc001080158d48cc394b657331f642983d1ce0b1

    • SHA512

      0fc70c2af038fb7922dffdd804d6234914459a2ba8a90eaf356232a80528e67b4c719f66d1b0664008308f0368fcb2e889aab7f9e27864b7c516c28f3acb5a1f

    • SSDEEP

      6144:WLiJZN+SN48a0qkz6LJ4PKNhEYUVP4Mu:nr+w48aB26NHXEYU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks