General

  • Target

    JaffaCakes118_5464df8918e5977f6e16e1f39898b92b5b69a4f0ab6d2f3374bf0b4aca246eee

  • Size

    299KB

  • Sample

    241229-evdwesslhl

  • MD5

    fc7e642644626b8857777f4b253f115d

  • SHA1

    17b38fb3dd5826a4f6d5208dbd2292011b13ee28

  • SHA256

    5464df8918e5977f6e16e1f39898b92b5b69a4f0ab6d2f3374bf0b4aca246eee

  • SHA512

    6799435871d1dd58f240cff67b5c3718609c5b679d84bae4552901561e37f2ac8dd3fb68ba20538e7dcdc02a6a5cac6e25f48906da0722280ac17144295f4b14

  • SSDEEP

    6144:f/blk14f8PO3ZCxKjlndRHaTQPr4EZdtgIP:fZbrCxKXRHaTQ0KQ

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Targets

    • Target

      JaffaCakes118_5464df8918e5977f6e16e1f39898b92b5b69a4f0ab6d2f3374bf0b4aca246eee

    • Size

      299KB

    • MD5

      fc7e642644626b8857777f4b253f115d

    • SHA1

      17b38fb3dd5826a4f6d5208dbd2292011b13ee28

    • SHA256

      5464df8918e5977f6e16e1f39898b92b5b69a4f0ab6d2f3374bf0b4aca246eee

    • SHA512

      6799435871d1dd58f240cff67b5c3718609c5b679d84bae4552901561e37f2ac8dd3fb68ba20538e7dcdc02a6a5cac6e25f48906da0722280ac17144295f4b14

    • SSDEEP

      6144:f/blk14f8PO3ZCxKjlndRHaTQPr4EZdtgIP:fZbrCxKXRHaTQ0KQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks