General

  • Target

    JaffaCakes118_de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff

  • Size

    304KB

  • Sample

    241229-17zvbaylcx

  • MD5

    22a413c15a4a559e00bb46a7ea9c8328

  • SHA1

    75e0330c2ddced4d2f752709e2f2733f2557f922

  • SHA256

    de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff

  • SHA512

    fca580091b1b058c3602a92d4645d206a323300e10664ec7085ef4270c269d88d5442770cafa6886aedc8ee6472959f3f27090e5ac6d8a0759bc1d9e5de3c7bf

  • SSDEEP

    6144:VTjfugLvStP73OTkf87CjHIWRLIIL6MCOhxxFeTr/ekI:VrrStakfKGHP/L6+zxF6L

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff

    • Size

      304KB

    • MD5

      22a413c15a4a559e00bb46a7ea9c8328

    • SHA1

      75e0330c2ddced4d2f752709e2f2733f2557f922

    • SHA256

      de17973ae83b8d093085f6288d74a8dcbccac465f0201030ea223b1b38cb29ff

    • SHA512

      fca580091b1b058c3602a92d4645d206a323300e10664ec7085ef4270c269d88d5442770cafa6886aedc8ee6472959f3f27090e5ac6d8a0759bc1d9e5de3c7bf

    • SSDEEP

      6144:VTjfugLvStP73OTkf87CjHIWRLIIL6MCOhxxFeTr/ekI:VrrStakfKGHP/L6+zxF6L

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks