General

  • Target

    JaffaCakes118_48ad47bd1cda58f6b29bf550b41d187242ddb7065ebc1f0f66ba74998084485b

  • Size

    296KB

  • Sample

    241229-rav1estjbq

  • MD5

    bfc0fc7b1de893238657f0a52605fa15

  • SHA1

    83896faa60c96a7570cf9c6af784a2ca7ab9a93e

  • SHA256

    48ad47bd1cda58f6b29bf550b41d187242ddb7065ebc1f0f66ba74998084485b

  • SHA512

    1cacdc05423e5fcd2dbba3da9fca6aa0ab232cf20dd5046a52c038c7eb73661dbfd9d70339e62855e5c57c6c0bb87d61c44c90afd2f7d6410e2a506d6bf914f2

  • SSDEEP

    3072:5bb4eNWRoLsGWOk+m4JsQAbtFplgJZO80t6mEndgUWrxpzbgqru:5f9W2Lswk+3+JzaQEdLuzbgwu

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

parubey.info

Targets

    • Target

      JaffaCakes118_48ad47bd1cda58f6b29bf550b41d187242ddb7065ebc1f0f66ba74998084485b

    • Size

      296KB

    • MD5

      bfc0fc7b1de893238657f0a52605fa15

    • SHA1

      83896faa60c96a7570cf9c6af784a2ca7ab9a93e

    • SHA256

      48ad47bd1cda58f6b29bf550b41d187242ddb7065ebc1f0f66ba74998084485b

    • SHA512

      1cacdc05423e5fcd2dbba3da9fca6aa0ab232cf20dd5046a52c038c7eb73661dbfd9d70339e62855e5c57c6c0bb87d61c44c90afd2f7d6410e2a506d6bf914f2

    • SSDEEP

      3072:5bb4eNWRoLsGWOk+m4JsQAbtFplgJZO80t6mEndgUWrxpzbgqru:5f9W2Lswk+3+JzaQEdLuzbgwu

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks