General

  • Target

    JaffaCakes118_10b4687aa42e274c8cf61d57d9933fb7

  • Size

    13.7MB

  • Sample

    241231-k74v9swlam

  • MD5

    10b4687aa42e274c8cf61d57d9933fb7

  • SHA1

    b263e17a45590b21cc53599d4d6838222d266b44

  • SHA256

    f58398f5c6ac87ce8bce4f21bda2ef0a74007d18a9f630703071504503166f0e

  • SHA512

    b3b2c3bd3e0c9917fb928bbb4600ebe677543c38b2961618f4c8f67908e649a03fbda4a06164697a8a7f18d197cceaef54cec6517e3bddfec7a9b44e9eb63bfa

  • SSDEEP

    98304:4EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE0:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_10b4687aa42e274c8cf61d57d9933fb7

    • Size

      13.7MB

    • MD5

      10b4687aa42e274c8cf61d57d9933fb7

    • SHA1

      b263e17a45590b21cc53599d4d6838222d266b44

    • SHA256

      f58398f5c6ac87ce8bce4f21bda2ef0a74007d18a9f630703071504503166f0e

    • SHA512

      b3b2c3bd3e0c9917fb928bbb4600ebe677543c38b2961618f4c8f67908e649a03fbda4a06164697a8a7f18d197cceaef54cec6517e3bddfec7a9b44e9eb63bfa

    • SSDEEP

      98304:4EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE0:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks