General

  • Target

    JaffaCakes118_75a2fd988159ad2855f0d8e85b72a5e6

  • Size

    14.1MB

  • Sample

    250103-3r1g1sslel

  • MD5

    75a2fd988159ad2855f0d8e85b72a5e6

  • SHA1

    86bc86cddb0fb7c8a1e9297a5587ba5e2e027003

  • SHA256

    94f3a611c239a6b1c3299127bdfcc989d979e6e701cf0662a1f8cabdeaea5227

  • SHA512

    0f152c1e9f026d8cc5302c26b356cca73aabaf177d20a8de471dd9a944eb57d49f5c08b038ffa2db1ef96092fadb480eb2fe0e48013180b06b53326744b30ca8

  • SSDEEP

    196608:EFIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIP:E

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_75a2fd988159ad2855f0d8e85b72a5e6

    • Size

      14.1MB

    • MD5

      75a2fd988159ad2855f0d8e85b72a5e6

    • SHA1

      86bc86cddb0fb7c8a1e9297a5587ba5e2e027003

    • SHA256

      94f3a611c239a6b1c3299127bdfcc989d979e6e701cf0662a1f8cabdeaea5227

    • SHA512

      0f152c1e9f026d8cc5302c26b356cca73aabaf177d20a8de471dd9a944eb57d49f5c08b038ffa2db1ef96092fadb480eb2fe0e48013180b06b53326744b30ca8

    • SSDEEP

      196608:EFIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIP:E

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks