General

  • Target

    JaffaCakes118_1b883b5d2b888c636af27554843ba011

  • Size

    14.3MB

  • Sample

    241231-pqjk8asqaj

  • MD5

    1b883b5d2b888c636af27554843ba011

  • SHA1

    87d6dec397d1431c24d09eaab7f216dc84581982

  • SHA256

    60d3784c885a575e4da68efddcaadd42b60de71878fcf1059dcb911182c692f7

  • SHA512

    0164eb1b14f1793f8068cc016ecbdc7f0d7891e1206577776c0b67d4a9d03fcc8a49c3c8458fb9559e1f4fdf67b5aa5cc4bc73fb8fb4ca27b24e08f4373d671f

  • SSDEEP

    196608:NE/vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvn:NE

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_1b883b5d2b888c636af27554843ba011

    • Size

      14.3MB

    • MD5

      1b883b5d2b888c636af27554843ba011

    • SHA1

      87d6dec397d1431c24d09eaab7f216dc84581982

    • SHA256

      60d3784c885a575e4da68efddcaadd42b60de71878fcf1059dcb911182c692f7

    • SHA512

      0164eb1b14f1793f8068cc016ecbdc7f0d7891e1206577776c0b67d4a9d03fcc8a49c3c8458fb9559e1f4fdf67b5aa5cc4bc73fb8fb4ca27b24e08f4373d671f

    • SSDEEP

      196608:NE/vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvn:NE

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks