General

  • Target

    JaffaCakes118_91afd4d395681d7acb2ca45e7a1817b3c828fad2e28e1c0ceaebb152176b20e1

  • Size

    275KB

  • Sample

    241230-3hvkeatnhq

  • MD5

    063b2c711a6b8465d2a41d4d40f2ca44

  • SHA1

    3fd50df7aaba9b0d0bdbf6562edb27ddbf9c669d

  • SHA256

    91afd4d395681d7acb2ca45e7a1817b3c828fad2e28e1c0ceaebb152176b20e1

  • SHA512

    ccb06b5c65430058b8a59e707097fae94cd5a9318d031f01e5c27150ef6a53fb6c5778c238aa548cc52337c9b1a476c9f2d65d8c7854ac2bc53eab93584ae963

  • SSDEEP

    3072:Mhcq5Laho8fOlVrtL5A4b/JwPn/yWsDrj651/DLPM7+M/h3:AX5Lwlf6VnW3UUDLPM7+

Malware Config

Extracted

Family

tofsee

C2

patmushta.info

ovicrush.cn

Targets

    • Target

      JaffaCakes118_91afd4d395681d7acb2ca45e7a1817b3c828fad2e28e1c0ceaebb152176b20e1

    • Size

      275KB

    • MD5

      063b2c711a6b8465d2a41d4d40f2ca44

    • SHA1

      3fd50df7aaba9b0d0bdbf6562edb27ddbf9c669d

    • SHA256

      91afd4d395681d7acb2ca45e7a1817b3c828fad2e28e1c0ceaebb152176b20e1

    • SHA512

      ccb06b5c65430058b8a59e707097fae94cd5a9318d031f01e5c27150ef6a53fb6c5778c238aa548cc52337c9b1a476c9f2d65d8c7854ac2bc53eab93584ae963

    • SSDEEP

      3072:Mhcq5Laho8fOlVrtL5A4b/JwPn/yWsDrj651/DLPM7+M/h3:AX5Lwlf6VnW3UUDLPM7+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks