General

  • Target

    JaffaCakes118_26ce3fd3ed7ba17781ecac3dd4222617

  • Size

    237KB

  • Sample

    241231-tg7nxaxqd1

  • MD5

    26ce3fd3ed7ba17781ecac3dd4222617

  • SHA1

    2a0ebd247fb6e3be27a1757c9bdee3148c94e55e

  • SHA256

    4a4cc69289edd4c28d77ddea461966cd8f52453c5b3f4a568a7b97791020d7a9

  • SHA512

    1f23f5aafb35dcac59504f823cdbbc6a67ee8830d95e8f6c2aad4bc2f4fafc66cea41b81f836e00e345ffb84f1828ab5aaa394b74e5fecf1f443ffb692b91ab2

  • SSDEEP

    6144:C4IcgPQpVgd0OmeDnkEi7BKzzRC+TueOHW0:CBXAVgd0OmAkEieFChR

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_26ce3fd3ed7ba17781ecac3dd4222617

    • Size

      237KB

    • MD5

      26ce3fd3ed7ba17781ecac3dd4222617

    • SHA1

      2a0ebd247fb6e3be27a1757c9bdee3148c94e55e

    • SHA256

      4a4cc69289edd4c28d77ddea461966cd8f52453c5b3f4a568a7b97791020d7a9

    • SHA512

      1f23f5aafb35dcac59504f823cdbbc6a67ee8830d95e8f6c2aad4bc2f4fafc66cea41b81f836e00e345ffb84f1828ab5aaa394b74e5fecf1f443ffb692b91ab2

    • SSDEEP

      6144:C4IcgPQpVgd0OmeDnkEi7BKzzRC+TueOHW0:CBXAVgd0OmAkEieFChR

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks