General

  • Target

    JaffaCakes118_bdd7f1c254d2bd154445ab9f0dfb1213c30ffd241720862b5ad561fa1ad198fd

  • Size

    138KB

  • Sample

    241230-3kjkxswrfw

  • MD5

    b9a33b8cb9f482ff1cb3774e97ead4dd

  • SHA1

    0ba07890880d2d95f45d7c34bba682c1cc66b646

  • SHA256

    bdd7f1c254d2bd154445ab9f0dfb1213c30ffd241720862b5ad561fa1ad198fd

  • SHA512

    544bab5b54ce30cdf91ea970821d4314c34d002d81a139a2ce17eaa7e7997ceb391e19cdb4c44690e0246b51de5e77d0577c3a239996d7b23cf2c6b0515f32fd

  • SSDEEP

    3072:XkhQBATi5WIOdtW3yHFJ55yHNq9MvsTuR6:XnYi51WYq9Mvuu

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_bdd7f1c254d2bd154445ab9f0dfb1213c30ffd241720862b5ad561fa1ad198fd

    • Size

      138KB

    • MD5

      b9a33b8cb9f482ff1cb3774e97ead4dd

    • SHA1

      0ba07890880d2d95f45d7c34bba682c1cc66b646

    • SHA256

      bdd7f1c254d2bd154445ab9f0dfb1213c30ffd241720862b5ad561fa1ad198fd

    • SHA512

      544bab5b54ce30cdf91ea970821d4314c34d002d81a139a2ce17eaa7e7997ceb391e19cdb4c44690e0246b51de5e77d0577c3a239996d7b23cf2c6b0515f32fd

    • SSDEEP

      3072:XkhQBATi5WIOdtW3yHFJ55yHNq9MvsTuR6:XnYi51WYq9Mvuu

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks