General

  • Target

    JaffaCakes118_57c95a2c8115f5190662591b71bd5ef04af79412a43b00e3b1b3e964a0dabeb9

  • Size

    254KB

  • Sample

    241229-ndewtszpht

  • MD5

    613e1a25d4d4a8690d2bce34c6bbc453

  • SHA1

    52b6635de76194a2929e33b04cb222d3ab4085b0

  • SHA256

    57c95a2c8115f5190662591b71bd5ef04af79412a43b00e3b1b3e964a0dabeb9

  • SHA512

    e0f0bbe301e59a1e87d4014c1f8d63fd7a13cb6f9e754b5987a5328372e3b3c944e0af511090f523e9947dad85e5a2d89176936b07f2ad245b85bd4666beaf34

  • SSDEEP

    6144:RoDgJvgPtv+zvATOKB7isFXGuYKtsKOmblLBxlfFO:Rq+4Ptv+zobAsFXTrBbRlc

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_57c95a2c8115f5190662591b71bd5ef04af79412a43b00e3b1b3e964a0dabeb9

    • Size

      254KB

    • MD5

      613e1a25d4d4a8690d2bce34c6bbc453

    • SHA1

      52b6635de76194a2929e33b04cb222d3ab4085b0

    • SHA256

      57c95a2c8115f5190662591b71bd5ef04af79412a43b00e3b1b3e964a0dabeb9

    • SHA512

      e0f0bbe301e59a1e87d4014c1f8d63fd7a13cb6f9e754b5987a5328372e3b3c944e0af511090f523e9947dad85e5a2d89176936b07f2ad245b85bd4666beaf34

    • SSDEEP

      6144:RoDgJvgPtv+zvATOKB7isFXGuYKtsKOmblLBxlfFO:Rq+4Ptv+zobAsFXTrBbRlc

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks