General

  • Target

    JaffaCakes118_9356a01842c62929ae89a5c5eac91bb3

  • Size

    12.0MB

  • Sample

    250105-hygchaymfp

  • MD5

    9356a01842c62929ae89a5c5eac91bb3

  • SHA1

    b921d4fb8d126b710b4faf8ae8754c47f9fd6daf

  • SHA256

    8d1bf0e97686184c5836db9e0d96dad0f96d8292e1931e564195114d48a6a3ab

  • SHA512

    6d440fb56c14b5d7eb8a338dc4a274ec5d39f486b6936fe934dbea0f35fd23b069963c4140cd61a4f5667395124e7e751784d3c830ebe5005b901a1ffbc427f8

  • SSDEEP

    3072:yv0SX17yb9Mq/eNh36eSMXBUOh9W1HGwyPp0mV65po3QIZz50hbKwdqAlSTf6SlH:yw9MTh3cABrcHGwAc5povZ10MwdqAA/

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_9356a01842c62929ae89a5c5eac91bb3

    • Size

      12.0MB

    • MD5

      9356a01842c62929ae89a5c5eac91bb3

    • SHA1

      b921d4fb8d126b710b4faf8ae8754c47f9fd6daf

    • SHA256

      8d1bf0e97686184c5836db9e0d96dad0f96d8292e1931e564195114d48a6a3ab

    • SHA512

      6d440fb56c14b5d7eb8a338dc4a274ec5d39f486b6936fe934dbea0f35fd23b069963c4140cd61a4f5667395124e7e751784d3c830ebe5005b901a1ffbc427f8

    • SSDEEP

      3072:yv0SX17yb9Mq/eNh36eSMXBUOh9W1HGwyPp0mV65po3QIZz50hbKwdqAlSTf6SlH:yw9MTh3cABrcHGwAc5povZ10MwdqAA/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks