General

  • Target

    JaffaCakes118_37c64893aa0f080f5a87ba78097fb143

  • Size

    13.6MB

  • Sample

    250106-ys13qaykbn

  • MD5

    37c64893aa0f080f5a87ba78097fb143

  • SHA1

    7db7a0ddea0841f10b5f4fe035135f6617850486

  • SHA256

    a38284b03308b30a89eaec1add9ef1e5580a02c026fd012210ac7977b3da575b

  • SHA512

    7cfde51ceec8c684c86eaf42abd3029caa06be0f1989b8aaed29855fae26ae7c5464c37be26cae9ff8a53e7bda2bf572e6ddae0b2376ea4e334416c557f39e39

  • SSDEEP

    6144:ErZQVnJzxj5nP76vk7wQ6udJm1lzvGCUWlnpj:YZ2zxj5nPmRQ6QgjzOCnl

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_37c64893aa0f080f5a87ba78097fb143

    • Size

      13.6MB

    • MD5

      37c64893aa0f080f5a87ba78097fb143

    • SHA1

      7db7a0ddea0841f10b5f4fe035135f6617850486

    • SHA256

      a38284b03308b30a89eaec1add9ef1e5580a02c026fd012210ac7977b3da575b

    • SHA512

      7cfde51ceec8c684c86eaf42abd3029caa06be0f1989b8aaed29855fae26ae7c5464c37be26cae9ff8a53e7bda2bf572e6ddae0b2376ea4e334416c557f39e39

    • SSDEEP

      6144:ErZQVnJzxj5nP76vk7wQ6udJm1lzvGCUWlnpj:YZ2zxj5nPmRQ6QgjzOCnl

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks