General

  • Target

    JaffaCakes118_f1adfa1faa086249af51ed20fc83cdb03399f197807c4fadaa5e8b4dcd1f04d2

  • Size

    166KB

  • Sample

    241229-ay45kaxjhk

  • MD5

    367fb0a93e9ac87417d1f5b717677492

  • SHA1

    35e334f3b6b197124f3de2f1b75d56b886445c88

  • SHA256

    f1adfa1faa086249af51ed20fc83cdb03399f197807c4fadaa5e8b4dcd1f04d2

  • SHA512

    ed12349162e8880f5ed416c36fde94fc669bf71f816345b20d3a0e553ac8c73a47d4b196364f54cd3d059e3e2cfe2bc57420e55d4c64fa646f2ff8afc3afa230

  • SSDEEP

    3072:LclL4ayAU13WhlasNxijKEeDG/5eaHKA/EqX/aTX:AYATHNIunzaHzM2/a

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_f1adfa1faa086249af51ed20fc83cdb03399f197807c4fadaa5e8b4dcd1f04d2

    • Size

      166KB

    • MD5

      367fb0a93e9ac87417d1f5b717677492

    • SHA1

      35e334f3b6b197124f3de2f1b75d56b886445c88

    • SHA256

      f1adfa1faa086249af51ed20fc83cdb03399f197807c4fadaa5e8b4dcd1f04d2

    • SHA512

      ed12349162e8880f5ed416c36fde94fc669bf71f816345b20d3a0e553ac8c73a47d4b196364f54cd3d059e3e2cfe2bc57420e55d4c64fa646f2ff8afc3afa230

    • SSDEEP

      3072:LclL4ayAU13WhlasNxijKEeDG/5eaHKA/EqX/aTX:AYATHNIunzaHzM2/a

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks