General

  • Target

    JaffaCakes118_5b720f313daee0403bb2584910f0eea6

  • Size

    11.4MB

  • Sample

    250101-thbb4atqer

  • MD5

    5b720f313daee0403bb2584910f0eea6

  • SHA1

    16c1148e04eb92bcc6e4469c883979f52fa95241

  • SHA256

    a9a291b7f9911e58c9f650f2bd37589abcb3bef5c2ff650702cca54f5bee7434

  • SHA512

    da27f80d5d66bd8fc99ea0edc097875a074a6f4499319ac05f0cd03de1c85d859b5411cd8fcf40c191221008c6eb70efc7c51ab506047d176d09629044e7f794

  • SSDEEP

    98304:e+ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZH:e

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_5b720f313daee0403bb2584910f0eea6

    • Size

      11.4MB

    • MD5

      5b720f313daee0403bb2584910f0eea6

    • SHA1

      16c1148e04eb92bcc6e4469c883979f52fa95241

    • SHA256

      a9a291b7f9911e58c9f650f2bd37589abcb3bef5c2ff650702cca54f5bee7434

    • SHA512

      da27f80d5d66bd8fc99ea0edc097875a074a6f4499319ac05f0cd03de1c85d859b5411cd8fcf40c191221008c6eb70efc7c51ab506047d176d09629044e7f794

    • SSDEEP

      98304:e+ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZH:e

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks