General

  • Target

    JaffaCakes118_dc63c79c3f7bc083812b8e8f47c44902

  • Size

    14.5MB

  • Sample

    250110-gfe62stqay

  • MD5

    dc63c79c3f7bc083812b8e8f47c44902

  • SHA1

    640329ba407b6ed8482d2d5e0d082847451a7d37

  • SHA256

    d29a3b017f6a864c855fca570073d822bb37a77006467b8a75f04ce7edcbfedc

  • SHA512

    5610cb53a6274f62be4e9341f6eb0fda3e28ccb4f69b344b63c4a531f9044ca758519f89aacc5d312624962606e80333ae38fab9ea84e453513c7f754e6b2534

  • SSDEEP

    12288:OZlC6v/5oQU6buXH53333333333333333333333333333333333333333333333n:ObjvluXH

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_dc63c79c3f7bc083812b8e8f47c44902

    • Size

      14.5MB

    • MD5

      dc63c79c3f7bc083812b8e8f47c44902

    • SHA1

      640329ba407b6ed8482d2d5e0d082847451a7d37

    • SHA256

      d29a3b017f6a864c855fca570073d822bb37a77006467b8a75f04ce7edcbfedc

    • SHA512

      5610cb53a6274f62be4e9341f6eb0fda3e28ccb4f69b344b63c4a531f9044ca758519f89aacc5d312624962606e80333ae38fab9ea84e453513c7f754e6b2534

    • SSDEEP

      12288:OZlC6v/5oQU6buXH53333333333333333333333333333333333333333333333n:ObjvluXH

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks