General

  • Target

    JaffaCakes118_c3c45c2d5a6de31334e9eb57559f442ddc07fc9dce08062714247b69952931ef

  • Size

    6.0MB

  • Sample

    241229-f73wratpck

  • MD5

    c418f484a9f1bd4ca0ba36a2fbe0b318

  • SHA1

    900ee3d2bb79b22cb3a2244d2568161cca7904ef

  • SHA256

    c3c45c2d5a6de31334e9eb57559f442ddc07fc9dce08062714247b69952931ef

  • SHA512

    b4485cc667c499792ab5cb24c7ee3930feefe6f024bd7f9676676b752f9983e06a5b81c2edaf8339ace11e2e3fb8658d4702d65ef36670b4b9d9d8e81a368e0c

  • SSDEEP

    98304:lt4xiRx6JKmPBkWDuMtrfVpW0VoB/tPz6Z6biR0czdnqXRnpvCoDG0G6riLQ7ER:eWx6hJl9pvoBUZ6JcRnqXw0AE7ER

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      d2eef19387f131ebef8b9a6599f2d15a99a38712598e24b49fb115474f937de5

    • Size

      13.3MB

    • MD5

      9ac9b03395cb95636509dc9662ce4331

    • SHA1

      2a88725393914efc779d7a18d0e6b8e6b403d549

    • SHA256

      d2eef19387f131ebef8b9a6599f2d15a99a38712598e24b49fb115474f937de5

    • SHA512

      c5583b5569ca303b303b7d4b688c59d8dbd42b171353faaf6e60772f4fe18d7d4901a12c708494690636223da5c71ff78bc9a33cf73368e084264b5f9d04dc57

    • SSDEEP

      98304:666666666666666666666666666666666666666666666666666666666666666D:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks