General

  • Target

    JaffaCakes118_2ed4d294c9be6a8a2dec9f2c818e23e8

  • Size

    14.5MB

  • Sample

    250106-t8rrrstnan

  • MD5

    2ed4d294c9be6a8a2dec9f2c818e23e8

  • SHA1

    51abe63d2c568714126dfc49ccf213998fa49882

  • SHA256

    2752e686bece3bcbed58f43149fb9432050ec5912a23a9b5223b5b28bfa06c5c

  • SHA512

    a0aa05c09d8b278c2abca570f8c9ccfadd8a14bb8675dbfdbf43547bf67a12e31ddbaf44bdc0bed2039cab69973ccfd058e674da14fa03f88f53bc1486dec4ba

  • SSDEEP

    6144:fSP2GmiErAKEjgoUYRxiPnkIW2p6/hR6bPz/9hniF:mdEkf5UmiE2pagL9hi

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_2ed4d294c9be6a8a2dec9f2c818e23e8

    • Size

      14.5MB

    • MD5

      2ed4d294c9be6a8a2dec9f2c818e23e8

    • SHA1

      51abe63d2c568714126dfc49ccf213998fa49882

    • SHA256

      2752e686bece3bcbed58f43149fb9432050ec5912a23a9b5223b5b28bfa06c5c

    • SHA512

      a0aa05c09d8b278c2abca570f8c9ccfadd8a14bb8675dbfdbf43547bf67a12e31ddbaf44bdc0bed2039cab69973ccfd058e674da14fa03f88f53bc1486dec4ba

    • SSDEEP

      6144:fSP2GmiErAKEjgoUYRxiPnkIW2p6/hR6bPz/9hniF:mdEkf5UmiE2pagL9hi

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks