General

  • Target

    JaffaCakes118_4ed3097a377f184052b6114bca7910b82483069cb44f41018effb35ed8a4982f

  • Size

    5.5MB

  • Sample

    241229-b78d1sylcx

  • MD5

    1469413792f74bd1d95e4a86d4a890f1

  • SHA1

    a056703652915f708678f2e627e7f4f9d9b08a59

  • SHA256

    4ed3097a377f184052b6114bca7910b82483069cb44f41018effb35ed8a4982f

  • SHA512

    99baddf5902c96c26928ec388e0ee798d5ac08011bea1650db1cd4c00ed81144ab401ba80a3633def941884ef01b36fd31642d8ccda23b61a081e2dda06dea4c

  • SSDEEP

    98304:jr11NHi9KW+MCJRFeCPX9ySCWqnQ1kmkuDMpffK9UHQA0Nxxb4rAF1dHlnhh6Jc:jz5CKW+XnFeCZMlmkumKNxGAF1mc

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      52a2fbd7660436a98e2201e0644c79a884c7e65d0aa9ae03e85dd712186b9756

    • Size

      12.1MB

    • MD5

      0078e04b4b221dcf34b756a45a3908c0

    • SHA1

      ee14854ccf6c55d5d4d84f124647c7af3b26385d

    • SHA256

      52a2fbd7660436a98e2201e0644c79a884c7e65d0aa9ae03e85dd712186b9756

    • SHA512

      b4cab47c711425aca34c8a9eb3b46ebcbdc0849fc43c1ba592a254e6f7228db628d3587806c9937263178bf760374ed4c8a6e7285a645c21b7b8326c66b6b086

    • SSDEEP

      98304:m66666666666666666666666666666666666666666666666666666666666666z:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks