General

  • Target

    JaffaCakes118_8a58cd77a16cf1b24e676f63f527d54a0443dcf844233909b3ebec736cd54cd4

  • Size

    283KB

  • Sample

    241229-q28j6asqd1

  • MD5

    9f4582b83cdd1ff7bd7a9055bf48bf32

  • SHA1

    275b08eee23369a36c2011d67c99f1ec0dd0af24

  • SHA256

    8a58cd77a16cf1b24e676f63f527d54a0443dcf844233909b3ebec736cd54cd4

  • SHA512

    0f1f821921c3b9df09de92821a6630d5f9c886c706b793f3c0f2c49189235059a7a3cfe7507896cc2f4b37d5c4892b4787f959c9147c9e96f68f35d7a79fb470

  • SSDEEP

    3072:aMfSQWigMDolLIUeaKEb1D1cKX7xc09ZOycvIAZgERt6NPtHvs+bxqkqbi0o83j1:aeSojoveyb1ZvLxB6g86P0+9io

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_8a58cd77a16cf1b24e676f63f527d54a0443dcf844233909b3ebec736cd54cd4

    • Size

      283KB

    • MD5

      9f4582b83cdd1ff7bd7a9055bf48bf32

    • SHA1

      275b08eee23369a36c2011d67c99f1ec0dd0af24

    • SHA256

      8a58cd77a16cf1b24e676f63f527d54a0443dcf844233909b3ebec736cd54cd4

    • SHA512

      0f1f821921c3b9df09de92821a6630d5f9c886c706b793f3c0f2c49189235059a7a3cfe7507896cc2f4b37d5c4892b4787f959c9147c9e96f68f35d7a79fb470

    • SSDEEP

      3072:aMfSQWigMDolLIUeaKEb1D1cKX7xc09ZOycvIAZgERt6NPtHvs+bxqkqbi0o83j1:aeSojoveyb1ZvLxB6g86P0+9io

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks