General

  • Target

    JaffaCakes118_116b97527179910ca3fc8f83b19b462c9458e9171b6b8fee2d5cb15f0e7bea90

  • Size

    294KB

  • Sample

    241229-f6atkstnfr

  • MD5

    a1bdfd66929511e7bbcc0ce444d1a0c0

  • SHA1

    dcbaebdb5056efacf8175f9ee02dadbbadc3133b

  • SHA256

    116b97527179910ca3fc8f83b19b462c9458e9171b6b8fee2d5cb15f0e7bea90

  • SHA512

    3e72e65bd3cbf4f518f3c25cd149f99282cd351cd79899081688fb019d4ec3860c30b0076f096bd06fe844720eca0dce5309740b92e0c5c4f206818aebc31fbc

  • SSDEEP

    6144:qZVs9POvu5Qi21Dqcjah3gd01p9JQ98JCYkM:qMmuGVDqcld039JQ0C

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Targets

    • Target

      JaffaCakes118_116b97527179910ca3fc8f83b19b462c9458e9171b6b8fee2d5cb15f0e7bea90

    • Size

      294KB

    • MD5

      a1bdfd66929511e7bbcc0ce444d1a0c0

    • SHA1

      dcbaebdb5056efacf8175f9ee02dadbbadc3133b

    • SHA256

      116b97527179910ca3fc8f83b19b462c9458e9171b6b8fee2d5cb15f0e7bea90

    • SHA512

      3e72e65bd3cbf4f518f3c25cd149f99282cd351cd79899081688fb019d4ec3860c30b0076f096bd06fe844720eca0dce5309740b92e0c5c4f206818aebc31fbc

    • SSDEEP

      6144:qZVs9POvu5Qi21Dqcjah3gd01p9JQ98JCYkM:qMmuGVDqcld039JQ0C

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks