General

  • Target

    JaffaCakes118_7e9dcf4dbc0fc5a0196b7cac80ade6dc1965ff0404e41cd4754c7ad98f723ba4

  • Size

    5.5MB

  • Sample

    241229-27ae4azmes

  • MD5

    3e210eef053d46f6655ea761defc574d

  • SHA1

    8ac0acff996e813f46db3adece749c40ce924a58

  • SHA256

    7e9dcf4dbc0fc5a0196b7cac80ade6dc1965ff0404e41cd4754c7ad98f723ba4

  • SHA512

    594ffece54aa43b26ee9ad55cfbe8d5fca60feeb535eabd472817dd7851115ed28e790402a09f299fc85fb25f2a9cb2ffd57e85836ff138cac65b097aae30d7a

  • SSDEEP

    98304:pAMHMbEhCNOC0cmbKyWMPvV7bmJ9npE5k6CwYblOnAbPCsPGQ4NCBYT1eEQn6PLi:pAN07fzHV7bmJ9nS55cblOnAVPr8fQnB

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      b49a0f70c825b7b3dec72b1205df3f32112e226003b365ce0e027e0c5a6600c4

    • Size

      12.2MB

    • MD5

      73611efc149014c994fedbdebd25fb36

    • SHA1

      3b13c6f2fa9dbc51c546570e51bf3ba912b71d9f

    • SHA256

      b49a0f70c825b7b3dec72b1205df3f32112e226003b365ce0e027e0c5a6600c4

    • SHA512

      18229c238aea6e1c4f4cf17fbb4c3840508a4bbec80fa8b55b11157f8737a13c55cb6c70038559d809027870bdfdce69d795d4832a41e78d988077597bd07316

    • SSDEEP

      98304:j66666666666666666666666666666666666666666666666666666666666666q:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks