General

  • Target

    JaffaCakes118_b6b04c889dd842c848cb86f0b01feb26900193ecc5aa863e699e26a186326a74

  • Size

    257KB

  • Sample

    241227-cp7kfazjcv

  • MD5

    bd8f74074139a4eebd38714fd34907ea

  • SHA1

    513f813e25cd88d9fd40a10c5ec6360079e64c30

  • SHA256

    b6b04c889dd842c848cb86f0b01feb26900193ecc5aa863e699e26a186326a74

  • SHA512

    9e2708595c30e4a53b475db2448258091eccb8dd6dbcd078122d4680643cb123b5c6dfb024d60bac17d64fee914f6a103770fd83043476458d0c73d647f3b64b

  • SSDEEP

    3072:uTjk+g7D/7ncnzNy6rVZE0pj9SpcvSyo7hs:uTjJ6/7ncA6hZE0pBSCF

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Targets

    • Target

      JaffaCakes118_b6b04c889dd842c848cb86f0b01feb26900193ecc5aa863e699e26a186326a74

    • Size

      257KB

    • MD5

      bd8f74074139a4eebd38714fd34907ea

    • SHA1

      513f813e25cd88d9fd40a10c5ec6360079e64c30

    • SHA256

      b6b04c889dd842c848cb86f0b01feb26900193ecc5aa863e699e26a186326a74

    • SHA512

      9e2708595c30e4a53b475db2448258091eccb8dd6dbcd078122d4680643cb123b5c6dfb024d60bac17d64fee914f6a103770fd83043476458d0c73d647f3b64b

    • SSDEEP

      3072:uTjk+g7D/7ncnzNy6rVZE0pj9SpcvSyo7hs:uTjJ6/7ncA6hZE0pBSCF

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks