General

  • Target

    JaffaCakes118_d318dc7b92c68cddb6ac8e82af8a7439

  • Size

    11.3MB

  • Sample

    250109-1l62haskb1

  • MD5

    d318dc7b92c68cddb6ac8e82af8a7439

  • SHA1

    c6fd11ca5e592b4992663d210b0c622e47c6697c

  • SHA256

    23f1145599ca4f2836be5ba2ef445c06709df2e71dc30d6cd534b60810673716

  • SHA512

    e44a44fe52d6017ef83aa569ca6c0277e0c8dd09f255e3b68fbbc032703ce8deee7f40c887abfe3feac291e63baa62e04098ad43ab15e2df3476cc731995c945

  • SSDEEP

    98304:9EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEU:

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_d318dc7b92c68cddb6ac8e82af8a7439

    • Size

      11.3MB

    • MD5

      d318dc7b92c68cddb6ac8e82af8a7439

    • SHA1

      c6fd11ca5e592b4992663d210b0c622e47c6697c

    • SHA256

      23f1145599ca4f2836be5ba2ef445c06709df2e71dc30d6cd534b60810673716

    • SHA512

      e44a44fe52d6017ef83aa569ca6c0277e0c8dd09f255e3b68fbbc032703ce8deee7f40c887abfe3feac291e63baa62e04098ad43ab15e2df3476cc731995c945

    • SSDEEP

      98304:9EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEU:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks