General

  • Target

    JaffaCakes118_325a874d9620fca74cba2bbca78fbb73cf1636fe399a8666e3ca34fe2aed8c09

  • Size

    166KB

  • Sample

    241230-29a5eawmdx

  • MD5

    e5da85aee6fd4e19a1faabfb8af48bc5

  • SHA1

    82f33ebc73bd068e0b51d5ae8833c7b7ff1c58cf

  • SHA256

    325a874d9620fca74cba2bbca78fbb73cf1636fe399a8666e3ca34fe2aed8c09

  • SHA512

    3c54eda61c691da060996783d4923ba4344d3783e9593e143b83fc1bb0a164741893aac020b4e276d97bd54182b9089085da23cdce2d8f0f99603097d81807c6

  • SSDEEP

    3072:Pb/gnGC+9RolSI/51Kh865MB7o7Al0Ptidvu5aR9ph8WClnyMC:bKS9qgDrG7ICKidWMR98WCVyN

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f

    • Size

      260KB

    • MD5

      17e796c1d99911ce19512a8adb8ea55a

    • SHA1

      e4e6aa0076157643919abbf26d9a444fd170d2e9

    • SHA256

      c944b1c3a2ec3d3141c00e8b83c4a88b5c76057f1119b3de079056fd65d2d33f

    • SHA512

      24c4e6e1303a817842d3a6019183d252abf24877aab184459782f7c1eac608feadf04f537164fec59e6ac30598759ccfb7fb7d85240fd5b527a15b8152951342

    • SSDEEP

      3072:xXO0xmVPc4N9LLXf3D7n5ksUGMAHXijUgzYcYhvT+iyQuvM/h3R:VNmVPhN9LjDfUK3j/W8

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks