General

  • Target

    JaffaCakes118_65bf617966af7e9a99e4460c251e3c41

  • Size

    11.3MB

  • Sample

    250107-qs5rxasrgw

  • MD5

    65bf617966af7e9a99e4460c251e3c41

  • SHA1

    b5571037498d0fb035f7aee1dcb97930f37d3322

  • SHA256

    cf522c5d8dd5027511930f29caf7574dc75191ed49412feb5805535a6f173230

  • SHA512

    66bbc89c7586e70e067a2589bb9c464137b1f5a9e100febdd81d5c4ff1ee02f6e33678f433a5e1242291b21eb0fc0032cb17556caa828017eabd1c00bc62974f

  • SSDEEP

    196608:jXPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPf:j

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_65bf617966af7e9a99e4460c251e3c41

    • Size

      11.3MB

    • MD5

      65bf617966af7e9a99e4460c251e3c41

    • SHA1

      b5571037498d0fb035f7aee1dcb97930f37d3322

    • SHA256

      cf522c5d8dd5027511930f29caf7574dc75191ed49412feb5805535a6f173230

    • SHA512

      66bbc89c7586e70e067a2589bb9c464137b1f5a9e100febdd81d5c4ff1ee02f6e33678f433a5e1242291b21eb0fc0032cb17556caa828017eabd1c00bc62974f

    • SSDEEP

      196608:jXPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPf:j

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks