General

  • Target

    JaffaCakes118_b86baa8e1503d0189cf137460f155183

  • Size

    14.7MB

  • Sample

    250105-xq78kssrbs

  • MD5

    b86baa8e1503d0189cf137460f155183

  • SHA1

    392b81e0cf10a0c4d0dc66861ecad3ec53014ca0

  • SHA256

    2e610cc893504d514ff0774c3fd07ded631064d7947546759c1721a37abc1db3

  • SHA512

    ee18e49055879b6554e7e3fbc680edc9a6808c415e2a9120f46a6f5eacb73ec17ba9010c49a7c91160bdc8135e48f013e210ae99b451d882bc6eae4f6978a0fc

  • SSDEEP

    12288:qdbYJ+lQMgLtAgtiMxyJFJNN0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaK:2vQMwRtiMO

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_b86baa8e1503d0189cf137460f155183

    • Size

      14.7MB

    • MD5

      b86baa8e1503d0189cf137460f155183

    • SHA1

      392b81e0cf10a0c4d0dc66861ecad3ec53014ca0

    • SHA256

      2e610cc893504d514ff0774c3fd07ded631064d7947546759c1721a37abc1db3

    • SHA512

      ee18e49055879b6554e7e3fbc680edc9a6808c415e2a9120f46a6f5eacb73ec17ba9010c49a7c91160bdc8135e48f013e210ae99b451d882bc6eae4f6978a0fc

    • SSDEEP

      12288:qdbYJ+lQMgLtAgtiMxyJFJNN0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaK:2vQMwRtiMO

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks