General

  • Target

    JaffaCakes118_370547d48d40907434f6ae225fe63299

  • Size

    14.5MB

  • Sample

    241231-zztgwsyrhz

  • MD5

    370547d48d40907434f6ae225fe63299

  • SHA1

    70e61d11ceb4dba3ce49e82c2185dd4611df6fb7

  • SHA256

    af2427a96c386bf82e2db183857b7a587f0d6793aeb1b3b3198bfc2c4cc940db

  • SHA512

    7a3c58e82ba8ecff0530da16bea8a57bd3ce3accc6c37b6ff251a8626aa00ebfdb15ea445a0acd46f9e32a7859c0f4c3e9604d3d542b3772198ff3f8f83ea90d

  • SSDEEP

    6144:fiP2GmiErAKEjgoUYRxiPnkIW2p6/hR6bPz/9hniF:2dEkf5UmiE2pagL9hi

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_370547d48d40907434f6ae225fe63299

    • Size

      14.5MB

    • MD5

      370547d48d40907434f6ae225fe63299

    • SHA1

      70e61d11ceb4dba3ce49e82c2185dd4611df6fb7

    • SHA256

      af2427a96c386bf82e2db183857b7a587f0d6793aeb1b3b3198bfc2c4cc940db

    • SHA512

      7a3c58e82ba8ecff0530da16bea8a57bd3ce3accc6c37b6ff251a8626aa00ebfdb15ea445a0acd46f9e32a7859c0f4c3e9604d3d542b3772198ff3f8f83ea90d

    • SSDEEP

      6144:fiP2GmiErAKEjgoUYRxiPnkIW2p6/hR6bPz/9hniF:2dEkf5UmiE2pagL9hi

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks