General

  • Target

    JaffaCakes118_dfb026acc3b422e65c75bc4d105d8f383e97fa0990b5631123e47ff9b7abb08f

  • Size

    287KB

  • Sample

    241230-zpx3bs1lfz

  • MD5

    df10072c1fc4a8e3b0544afa68a86296

  • SHA1

    77b06d7aae6a21ba7e3b5a668f252108276e8f77

  • SHA256

    dfb026acc3b422e65c75bc4d105d8f383e97fa0990b5631123e47ff9b7abb08f

  • SHA512

    cf54a8c9c40934091c05bd5d01f07db90525497fad403b966d5a5b36e6218292734bb3c894c30d263893e68baf9974d3e29458a5a9d5368c9a55e3c26294c34b

  • SSDEEP

    3072:EcJFj9Ec2xTndjpPsEluBFWP3Dlu0ay/MCZryAGs4AB37NryJvMT8RROhSm4+lXU:DbjPwndjpxlubC3TKTs4AqCTYMI2K

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_dfb026acc3b422e65c75bc4d105d8f383e97fa0990b5631123e47ff9b7abb08f

    • Size

      287KB

    • MD5

      df10072c1fc4a8e3b0544afa68a86296

    • SHA1

      77b06d7aae6a21ba7e3b5a668f252108276e8f77

    • SHA256

      dfb026acc3b422e65c75bc4d105d8f383e97fa0990b5631123e47ff9b7abb08f

    • SHA512

      cf54a8c9c40934091c05bd5d01f07db90525497fad403b966d5a5b36e6218292734bb3c894c30d263893e68baf9974d3e29458a5a9d5368c9a55e3c26294c34b

    • SSDEEP

      3072:EcJFj9Ec2xTndjpPsEluBFWP3Dlu0ay/MCZryAGs4AB37NryJvMT8RROhSm4+lXU:DbjPwndjpxlubC3TKTs4AqCTYMI2K

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks