General

  • Target

    JaffaCakes118_61ae4532d70c8ea72ad9739ade04758e2eb34b9d6333a7879517550bdcc1a26b

  • Size

    148KB

  • Sample

    241229-h7dyqswnbr

  • MD5

    d937e9d4887bacf2406cd56d83ddcabe

  • SHA1

    51b0377f5adbecfe3a07bcf49425bcc6d7839240

  • SHA256

    61ae4532d70c8ea72ad9739ade04758e2eb34b9d6333a7879517550bdcc1a26b

  • SHA512

    9fec9ba7b7c3721cf4d4d83febe4df0a571d076582673b97d1c2cf8861dc1d45a2c3100dc4c78eb339e9f87f27aec36deecca50e026bbba46c5cc91a6cf4abee

  • SSDEEP

    3072:JrjZz55dTAJokLUweCCfTAl1r1WpEFrriaQVaFQjVOcFZwm7OV:1jF5OoUUWIQopEFBQV7j4cFZKV

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Targets

    • Target

      786f5910ef3eb2b58bc6795067a0ee8f7a318bc09354e167220c81712087a007

    • Size

      312KB

    • MD5

      62b75bff0859e20c5a8a2ec94ec1ebdc

    • SHA1

      2385c826549d8e526229e081173ec54fb9498be0

    • SHA256

      786f5910ef3eb2b58bc6795067a0ee8f7a318bc09354e167220c81712087a007

    • SHA512

      1f056472c5d90b791af941ba97d252c7f4c7aee1a95128e273be7e4f41445321707a478f64c0e1e209bea6f666662e1a82e315a01c777f0308015d416c18f0e4

    • SSDEEP

      3072:zk0/LshkyJORLxH6dgiOxO2IYDWxT7qwA3OEQf9ltLCWrxpzbgqruJnfed:Q0/LsnORGhrxTqrKeuzbgwuJG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks