General

  • Target

    JaffaCakes118_6f27190edb3775f165617d13e32e3e90

  • Size

    117KB

  • Sample

    250103-ylhykatjgr

  • MD5

    6f27190edb3775f165617d13e32e3e90

  • SHA1

    66bc0f60853a9b20ee761c09ae6f5af5a480b8ec

  • SHA256

    b24a82191df95eaffd79dc0e4f7eac91c48cb7e37ade114c29218aef038ee6e3

  • SHA512

    9ad1671828a155b7a9af9f7796cb4b632bb9249849107ac109ff778e99e232687b2b5f41f26e8f5811783632e11bdaa1e237b22fcd824315f915128e0c9664b2

  • SSDEEP

    1536:MKxS+iac/mX84H4VG6AO4kRd+3j6VPvTW1YLakyPzk0O64Y3V:MZ+iZ/mX8UaG6SF3+VnpakyPzkXu

Malware Config

Extracted

Family

tofsee

C2

94.242.250.149

91.218.38.245

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      JaffaCakes118_6f27190edb3775f165617d13e32e3e90

    • Size

      117KB

    • MD5

      6f27190edb3775f165617d13e32e3e90

    • SHA1

      66bc0f60853a9b20ee761c09ae6f5af5a480b8ec

    • SHA256

      b24a82191df95eaffd79dc0e4f7eac91c48cb7e37ade114c29218aef038ee6e3

    • SHA512

      9ad1671828a155b7a9af9f7796cb4b632bb9249849107ac109ff778e99e232687b2b5f41f26e8f5811783632e11bdaa1e237b22fcd824315f915128e0c9664b2

    • SSDEEP

      1536:MKxS+iac/mX84H4VG6AO4kRd+3j6VPvTW1YLakyPzk0O64Y3V:MZ+iZ/mX8UaG6SF3+VnpakyPzkXu

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks