General

  • Target

    JaffaCakes118_8d5cf5412047ce007f13174937a4d7664bf97816b1b274f887c5b91eecfd3e54

  • Size

    241KB

  • Sample

    241229-3dptcszpct

  • MD5

    0ae6c8339377c3855ddadcad76673d8a

  • SHA1

    ce2b58ab96ef3790ce55307ee3d7c04399b3e821

  • SHA256

    8d5cf5412047ce007f13174937a4d7664bf97816b1b274f887c5b91eecfd3e54

  • SHA512

    0d99817de8f5450c05303eafb81d533003ef77f1df8a59d5ae068675ecbba15f00d80d1da307e5eb02a74ebfb4c8d7f2ed3ee64b51995dbaa0644d36a68d42df

  • SSDEEP

    3072:GOsUA8KZQ/IxsPVg4nkvzaHWgSjqdF0w2Uyopz9ZeCqJXXfehv1Ijoxw9xk:oUA8GV2e4nYWHEjqPt9cCqxmhv1pxQ

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_8d5cf5412047ce007f13174937a4d7664bf97816b1b274f887c5b91eecfd3e54

    • Size

      241KB

    • MD5

      0ae6c8339377c3855ddadcad76673d8a

    • SHA1

      ce2b58ab96ef3790ce55307ee3d7c04399b3e821

    • SHA256

      8d5cf5412047ce007f13174937a4d7664bf97816b1b274f887c5b91eecfd3e54

    • SHA512

      0d99817de8f5450c05303eafb81d533003ef77f1df8a59d5ae068675ecbba15f00d80d1da307e5eb02a74ebfb4c8d7f2ed3ee64b51995dbaa0644d36a68d42df

    • SSDEEP

      3072:GOsUA8KZQ/IxsPVg4nkvzaHWgSjqdF0w2Uyopz9ZeCqJXXfehv1Ijoxw9xk:oUA8GV2e4nYWHEjqPt9cCqxmhv1pxQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks