General

  • Target

    JaffaCakes118_4012e55d1495bcc3440ccc5dc5bd17b021f0724a3c947eed7b3c9bb0a9195980

  • Size

    244KB

  • Sample

    241230-gs5mgazqhy

  • MD5

    ed6e8ed7d52dd0197e76260ad64d15a8

  • SHA1

    90410de20da95b495a3dc0ca2f9c081171e8d1b3

  • SHA256

    4012e55d1495bcc3440ccc5dc5bd17b021f0724a3c947eed7b3c9bb0a9195980

  • SHA512

    aac419b880bc4e2864e8fcc0806ca37587cf697781db0378d9b3ea688c5d40e53a5dfc3fab3d698dc6aa843eb7c2a99005d5511137ef0021320e85362dd96edf

  • SSDEEP

    6144:Z2ZQ64l6/zVv1L11dwFB3uZUGcDQDWT7snfu/c8:kZj/zVtLo3uWXQDWT7CfuU

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_4012e55d1495bcc3440ccc5dc5bd17b021f0724a3c947eed7b3c9bb0a9195980

    • Size

      244KB

    • MD5

      ed6e8ed7d52dd0197e76260ad64d15a8

    • SHA1

      90410de20da95b495a3dc0ca2f9c081171e8d1b3

    • SHA256

      4012e55d1495bcc3440ccc5dc5bd17b021f0724a3c947eed7b3c9bb0a9195980

    • SHA512

      aac419b880bc4e2864e8fcc0806ca37587cf697781db0378d9b3ea688c5d40e53a5dfc3fab3d698dc6aa843eb7c2a99005d5511137ef0021320e85362dd96edf

    • SSDEEP

      6144:Z2ZQ64l6/zVv1L11dwFB3uZUGcDQDWT7snfu/c8:kZj/zVtLo3uWXQDWT7CfuU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks