General

  • Target

    JaffaCakes118_82b3608606028f7e9bf7f15045c275a5d839652151123c42c2d5ca152844425b

  • Size

    174KB

  • Sample

    241229-16g8waykgz

  • MD5

    d7fcb9d73b6836591c14b66aa2a8465b

  • SHA1

    fefc520146c691f4e345a3465c0c759248df7e1e

  • SHA256

    82b3608606028f7e9bf7f15045c275a5d839652151123c42c2d5ca152844425b

  • SHA512

    ae3fd51618e7386fc6d3c79f3d05a746bde751268cc16c8418346cdca59d5635e14c5ad3ba12913967c21b2fe75cc5a1c0b34fe754b1f880c6938f1e7ddb3d2e

  • SSDEEP

    3072:lXLo76LYs7jPk5lGIoNL1h08ElTwqAgAZeXKrkoi+M2oWka81dPjwZnHdNgx:lXLoGe5l6LYrlEqFAZe6rUF0cjoNgx

Malware Config

Extracted

Family

tofsee

C2

niflheimr.cn

jotunheim.name

Targets

    • Target

      0c562a5c681740b9496f31015d6ec74b9daf4ca21ce5dbde6788c866fb0d6aea.exe

    • Size

      13.0MB

    • MD5

      d4fbad00810efbb5dbd8a2452fe04ec3

    • SHA1

      65884289994c879fdf192a5e6662a04d1a2f649e

    • SHA256

      0c562a5c681740b9496f31015d6ec74b9daf4ca21ce5dbde6788c866fb0d6aea

    • SHA512

      b38b6d38106d8cb16dc5967ddd3be58bb5a4475867f1271896f1dbfc516d68b3f5de992a47ef31149ef264d889a1be8990ae26619ec6cc6c2b3a550bf69e7dd8

    • SSDEEP

      24576:cqkEnA6V///////////////////////////////////////////////////////3:cqC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks