General

  • Target

    JaffaCakes118_e4102e6bc13f395e41d56630933c5b7f

  • Size

    11.3MB

  • Sample

    250110-pgs4aswnaj

  • MD5

    e4102e6bc13f395e41d56630933c5b7f

  • SHA1

    0ed523c9ea7709add9343e7bbe007c67932488d5

  • SHA256

    94da4b758bbbfc4bf501f5232f16478b8c56a63e77f20090bf91a5c8c3821927

  • SHA512

    18df3f62bf992509f54f2a4acf702f513483f4104decb1b565339540932038d53e4796edcfb536bc7338665479e31cb57ca91840a4c79a5f467b288876740951

  • SSDEEP

    49152:kUkssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssX:k

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_e4102e6bc13f395e41d56630933c5b7f

    • Size

      11.3MB

    • MD5

      e4102e6bc13f395e41d56630933c5b7f

    • SHA1

      0ed523c9ea7709add9343e7bbe007c67932488d5

    • SHA256

      94da4b758bbbfc4bf501f5232f16478b8c56a63e77f20090bf91a5c8c3821927

    • SHA512

      18df3f62bf992509f54f2a4acf702f513483f4104decb1b565339540932038d53e4796edcfb536bc7338665479e31cb57ca91840a4c79a5f467b288876740951

    • SSDEEP

      49152:kUkssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssX:k

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks