General

  • Target

    JaffaCakes118_6f352302073de0e2bfe05dbfb220d074

  • Size

    152KB

  • Sample

    250103-yq42latmak

  • MD5

    6f352302073de0e2bfe05dbfb220d074

  • SHA1

    c36f3014baf28b7667612752e025cf138b448f55

  • SHA256

    26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6

  • SHA512

    5a9af4c6682a681732ec8c603bf146ce86d7cc698dfdde744245156c887399d65bc38d2bd4ac2075ed86088a4539c2f252a337abd04ce7beb71d8913e8208677

  • SSDEEP

    1536:oqJVtDbTMSjRZqsAONjZmZ9wkPGdkD8Vyzt/86My6n27InSJd:okTMNINjZBNkwmt/Ksd

Malware Config

Extracted

Family

tofsee

C2

103.9.150.244

188.190.120.102

121.127.250.203

188.165.132.183

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      JaffaCakes118_6f352302073de0e2bfe05dbfb220d074

    • Size

      152KB

    • MD5

      6f352302073de0e2bfe05dbfb220d074

    • SHA1

      c36f3014baf28b7667612752e025cf138b448f55

    • SHA256

      26128830cb8a15abdbc9b22a6a1aaece6bb8c2a13abc1103611fec4d867629b6

    • SHA512

      5a9af4c6682a681732ec8c603bf146ce86d7cc698dfdde744245156c887399d65bc38d2bd4ac2075ed86088a4539c2f252a337abd04ce7beb71d8913e8208677

    • SSDEEP

      1536:oqJVtDbTMSjRZqsAONjZmZ9wkPGdkD8Vyzt/86My6n27InSJd:okTMNINjZBNkwmt/Ksd

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks