General

  • Target

    JaffaCakes118_3cac8d9e28a92e9d0d5b598b7f5f204b770ed4c05c12dd62e320bf480fc67ea1

  • Size

    237KB

  • Sample

    241229-1x3hfsyjap

  • MD5

    7a1a48ccd69108c3d310aee449113b16

  • SHA1

    c60353c5f012f5203f3d3a13bf10ef98acb34bc0

  • SHA256

    3cac8d9e28a92e9d0d5b598b7f5f204b770ed4c05c12dd62e320bf480fc67ea1

  • SHA512

    2d36b02981ae72635728f4cc95ce2e47649ae9b98ce6c2e407eb00f6745dabacfa3df5dc5f398a3f73c7038ac17b6a2d80ee3486d1881d2ae850f090a7423fd1

  • SSDEEP

    6144:K4oK+W6n72e2Xr7OoNH9m8Pr/lJQlfZJqK:KBSY72e2XnNH9mq/l+b

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_3cac8d9e28a92e9d0d5b598b7f5f204b770ed4c05c12dd62e320bf480fc67ea1

    • Size

      237KB

    • MD5

      7a1a48ccd69108c3d310aee449113b16

    • SHA1

      c60353c5f012f5203f3d3a13bf10ef98acb34bc0

    • SHA256

      3cac8d9e28a92e9d0d5b598b7f5f204b770ed4c05c12dd62e320bf480fc67ea1

    • SHA512

      2d36b02981ae72635728f4cc95ce2e47649ae9b98ce6c2e407eb00f6745dabacfa3df5dc5f398a3f73c7038ac17b6a2d80ee3486d1881d2ae850f090a7423fd1

    • SSDEEP

      6144:K4oK+W6n72e2Xr7OoNH9m8Pr/lJQlfZJqK:KBSY72e2XnNH9mq/l+b

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks