General

  • Target

    JaffaCakes118_44d2bb1b945b6ae43a4bea7eb6d06bed6b9008438170e3298eb034b49a9169a9

  • Size

    237KB

  • Sample

    241229-fj7j2atjgj

  • MD5

    d3a038ef3f856723ca4e86d1e80610c4

  • SHA1

    aecf8b2eddcef044984ebaa14370e00dddc841bf

  • SHA256

    44d2bb1b945b6ae43a4bea7eb6d06bed6b9008438170e3298eb034b49a9169a9

  • SHA512

    535bf635e885ee06080b9e7b298a390562f4e66a04ddaa9f65773ebc236787f9692993afd9ae12ed5ca0279831efeb56bc9fc1c74ae14b6bbf3516a2b1200fbe

  • SSDEEP

    6144:8onO1WHesBjBiTjBRqZA6YWEZN7ERGc0J7YPFHFb6c:8m5+mjBi2ZA6YW01ERGc09Ybm

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_44d2bb1b945b6ae43a4bea7eb6d06bed6b9008438170e3298eb034b49a9169a9

    • Size

      237KB

    • MD5

      d3a038ef3f856723ca4e86d1e80610c4

    • SHA1

      aecf8b2eddcef044984ebaa14370e00dddc841bf

    • SHA256

      44d2bb1b945b6ae43a4bea7eb6d06bed6b9008438170e3298eb034b49a9169a9

    • SHA512

      535bf635e885ee06080b9e7b298a390562f4e66a04ddaa9f65773ebc236787f9692993afd9ae12ed5ca0279831efeb56bc9fc1c74ae14b6bbf3516a2b1200fbe

    • SSDEEP

      6144:8onO1WHesBjBiTjBRqZA6YWEZN7ERGc0J7YPFHFb6c:8m5+mjBi2ZA6YW01ERGc09Ybm

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks