General

  • Target

    JaffaCakes118_b6e0e560d78c516c9fdc7aac115c7a1a

  • Size

    11.6MB

  • Sample

    250105-w7km6svjem

  • MD5

    b6e0e560d78c516c9fdc7aac115c7a1a

  • SHA1

    009b9444c5456d7ef473320427045d2e6fa65745

  • SHA256

    73563ffcb2b871ef56e766df408c564b04fd1e43919929a0c15d028780ee2e73

  • SHA512

    12ddbf413fe7f320102f1064aac72ff73f32f16987f8eb1c3a4b12f2c5f984f18f64666a28e8f86506c795b804239c3d89df15dd294a235a250e232ca7c7c324

  • SSDEEP

    49152:I2mNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN9:l

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_b6e0e560d78c516c9fdc7aac115c7a1a

    • Size

      11.6MB

    • MD5

      b6e0e560d78c516c9fdc7aac115c7a1a

    • SHA1

      009b9444c5456d7ef473320427045d2e6fa65745

    • SHA256

      73563ffcb2b871ef56e766df408c564b04fd1e43919929a0c15d028780ee2e73

    • SHA512

      12ddbf413fe7f320102f1064aac72ff73f32f16987f8eb1c3a4b12f2c5f984f18f64666a28e8f86506c795b804239c3d89df15dd294a235a250e232ca7c7c324

    • SSDEEP

      49152:I2mNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN9:l

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks