General

  • Target

    JaffaCakes118_39580e95f621d8722f944615508073c1172a1afabc1442865d8040a40ee74634

  • Size

    235KB

  • Sample

    241229-n8n3zs1mbv

  • MD5

    090818f2a5159fe03a63ed4afcd42db5

  • SHA1

    b1ccc63a1b2e7ba4866808cbd8e1238e4480b80f

  • SHA256

    39580e95f621d8722f944615508073c1172a1afabc1442865d8040a40ee74634

  • SHA512

    3f15024d5c767335c1615155a16ac5a02a5d3c10da8ee3870098b77206c0864a43b55e26269a0620f169c8d7294c033a50728d49b895a3e1ccdbf648fabf3406

  • SSDEEP

    3072:xeDkLrszgUJFBFqLDy1HeZjKyXR5udHrg5T6sfPmMahsZVggjcGkNIVqI/sxkgad:xeDkLyFBALjpSZI7PmMFb7ITsqXigad

Malware Config

Extracted

Family

tofsee

C2

mubrikych.top

oxxyfix.xyz

Targets

    • Target

      JaffaCakes118_39580e95f621d8722f944615508073c1172a1afabc1442865d8040a40ee74634

    • Size

      235KB

    • MD5

      090818f2a5159fe03a63ed4afcd42db5

    • SHA1

      b1ccc63a1b2e7ba4866808cbd8e1238e4480b80f

    • SHA256

      39580e95f621d8722f944615508073c1172a1afabc1442865d8040a40ee74634

    • SHA512

      3f15024d5c767335c1615155a16ac5a02a5d3c10da8ee3870098b77206c0864a43b55e26269a0620f169c8d7294c033a50728d49b895a3e1ccdbf648fabf3406

    • SSDEEP

      3072:xeDkLrszgUJFBFqLDy1HeZjKyXR5udHrg5T6sfPmMahsZVggjcGkNIVqI/sxkgad:xeDkLyFBALjpSZI7PmMFb7ITsqXigad

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks