General

  • Target

    JaffaCakes118_c4c9428ea6a30325f8ac6a3fecc199a1

  • Size

    12.5MB

  • Sample

    250109-llly1awmfz

  • MD5

    c4c9428ea6a30325f8ac6a3fecc199a1

  • SHA1

    e8c27d01e8e1b4f11f6183e8ba4b3065392349ce

  • SHA256

    4fb9ec0883d7b509a16d73e2181f5236d13042706cb8bbe82091f8a9db4575d1

  • SHA512

    b052061f5936ee2f30fc18e81daa9542451a1ad58235bd180e7d01fa49977813945492890a1a37a3cec59bb261a626cd175f12ac85bec9e000273159980e7a33

  • SSDEEP

    196608:TPRMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMP:T

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_c4c9428ea6a30325f8ac6a3fecc199a1

    • Size

      12.5MB

    • MD5

      c4c9428ea6a30325f8ac6a3fecc199a1

    • SHA1

      e8c27d01e8e1b4f11f6183e8ba4b3065392349ce

    • SHA256

      4fb9ec0883d7b509a16d73e2181f5236d13042706cb8bbe82091f8a9db4575d1

    • SHA512

      b052061f5936ee2f30fc18e81daa9542451a1ad58235bd180e7d01fa49977813945492890a1a37a3cec59bb261a626cd175f12ac85bec9e000273159980e7a33

    • SSDEEP

      196608:TPRMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMP:T

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks