General

  • Target

    JaffaCakes118_12a217a7761bdafc7064f38fe7951c69

  • Size

    188KB

  • Sample

    250123-bxk6qswpfn

  • MD5

    12a217a7761bdafc7064f38fe7951c69

  • SHA1

    2944bc0be74f3e4773d07c06a278f927aa3bec0d

  • SHA256

    40b07ee803edaa7b70b06ac159aa94770c3490d7b5838074eb04fbbe8062ab29

  • SHA512

    606551b9cdeb075da710f96f6887329d0ec826640706c6b97997723c50b6aeb68fba87b78cebbb238c43fd5166879ea11890937772a2b7c6b7b0b3b279270629

  • SSDEEP

    3072:io+8CNt9mSGzkXoDTYjoJ4nQuCs7BOGlW8M/gt3stSMm8:i1z+TYjCevCsd3M8M/Q3sFm8

Malware Config

Extracted

Family

tofsee

C2

91.121.4.118

rgtryhbgddtyh.biz

wertdghbyrukl.ch

Targets

    • Target

      JaffaCakes118_12a217a7761bdafc7064f38fe7951c69

    • Size

      188KB

    • MD5

      12a217a7761bdafc7064f38fe7951c69

    • SHA1

      2944bc0be74f3e4773d07c06a278f927aa3bec0d

    • SHA256

      40b07ee803edaa7b70b06ac159aa94770c3490d7b5838074eb04fbbe8062ab29

    • SHA512

      606551b9cdeb075da710f96f6887329d0ec826640706c6b97997723c50b6aeb68fba87b78cebbb238c43fd5166879ea11890937772a2b7c6b7b0b3b279270629

    • SSDEEP

      3072:io+8CNt9mSGzkXoDTYjoJ4nQuCs7BOGlW8M/gt3stSMm8:i1z+TYjCevCsd3M8M/Q3sFm8

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks