General

  • Target

    JaffaCakes118_d07c4e5d572d8f14b73aa058139b559f

  • Size

    12.0MB

  • Sample

    250109-x7khvaymew

  • MD5

    d07c4e5d572d8f14b73aa058139b559f

  • SHA1

    11902bb50ec2f62c49a82ad36ff74ea5f1ab9d44

  • SHA256

    f358207ddc655e1d34988ac7755fa7493bee2f8c852fa5379da38d61d50543e2

  • SHA512

    fb6b788988ff4428e36dbc7b80c11eab54b7da62145f0bb6f08b2c975911778a9954cc53e366dea3b4b52829d2d65e42bc61e0af667e5e485379c623850c2825

  • SSDEEP

    12288:8ZnHC6Hf1kkNWoRjta3JZlPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPf:8dHCRiG

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_d07c4e5d572d8f14b73aa058139b559f

    • Size

      12.0MB

    • MD5

      d07c4e5d572d8f14b73aa058139b559f

    • SHA1

      11902bb50ec2f62c49a82ad36ff74ea5f1ab9d44

    • SHA256

      f358207ddc655e1d34988ac7755fa7493bee2f8c852fa5379da38d61d50543e2

    • SHA512

      fb6b788988ff4428e36dbc7b80c11eab54b7da62145f0bb6f08b2c975911778a9954cc53e366dea3b4b52829d2d65e42bc61e0af667e5e485379c623850c2825

    • SSDEEP

      12288:8ZnHC6Hf1kkNWoRjta3JZlPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPf:8dHCRiG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks