General

  • Target

    JaffaCakes118_e363711ac1b9775290bd77d2194c0a4da0bea97397ace5db5e6749b4bb0b6b87

  • Size

    243KB

  • Sample

    241229-nzyaas1kez

  • MD5

    efb9c0c07fd0dac85d7d7f2366c1cd94

  • SHA1

    92e07b8e7566aa83a096f566070dd5a9d0469b1a

  • SHA256

    e363711ac1b9775290bd77d2194c0a4da0bea97397ace5db5e6749b4bb0b6b87

  • SHA512

    360c1a9b5261fdc3088da3feb28df8866b7f4a5e09ea9e5b66362bee0bc3858620ddeebf0c0f04e3c6fe90068945eab513ff21e6113302363139197bac20325a

  • SSDEEP

    6144:pnZQZPsbbeUbJ676nG7zMjAcuLngy0sXt4Q7Gk:JZTbeUbJ6mAMjT3y0sXKQ

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_e363711ac1b9775290bd77d2194c0a4da0bea97397ace5db5e6749b4bb0b6b87

    • Size

      243KB

    • MD5

      efb9c0c07fd0dac85d7d7f2366c1cd94

    • SHA1

      92e07b8e7566aa83a096f566070dd5a9d0469b1a

    • SHA256

      e363711ac1b9775290bd77d2194c0a4da0bea97397ace5db5e6749b4bb0b6b87

    • SHA512

      360c1a9b5261fdc3088da3feb28df8866b7f4a5e09ea9e5b66362bee0bc3858620ddeebf0c0f04e3c6fe90068945eab513ff21e6113302363139197bac20325a

    • SSDEEP

      6144:pnZQZPsbbeUbJ676nG7zMjAcuLngy0sXt4Q7Gk:JZTbeUbJ6mAMjT3y0sXKQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks