General

  • Target

    fef1dddddde5a01cd2ed74e6c031bd23_JaffaCakes118

  • Size

    332KB

  • Sample

    240421-k52ywsgb4x

  • MD5

    fef1dddddde5a01cd2ed74e6c031bd23

  • SHA1

    38a3ed6a45566821ffdb0e13558d0869f4fec077

  • SHA256

    a6bffcb4a9a7eb5cab0789e497350262ba9ced233acb1ca2d598f756e7e47289

  • SHA512

    0711a792ff2824e0e244d7dcf16dc92cf97d34d0c9a56f62f00fbe9e670a11923f7e7c822bdb5a6e73159bd8459a2a115d84140c606acd1e706bd931621db905

  • SSDEEP

    6144:qutIFH/0RO0uydH3+BmV4gOj/Tz707JLEB8yA1muSE9jl+:qutIFfqVdH3+BmOBj/n70Fm8HmPi+

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      fef1dddddde5a01cd2ed74e6c031bd23_JaffaCakes118

    • Size

      332KB

    • MD5

      fef1dddddde5a01cd2ed74e6c031bd23

    • SHA1

      38a3ed6a45566821ffdb0e13558d0869f4fec077

    • SHA256

      a6bffcb4a9a7eb5cab0789e497350262ba9ced233acb1ca2d598f756e7e47289

    • SHA512

      0711a792ff2824e0e244d7dcf16dc92cf97d34d0c9a56f62f00fbe9e670a11923f7e7c822bdb5a6e73159bd8459a2a115d84140c606acd1e706bd931621db905

    • SSDEEP

      6144:qutIFH/0RO0uydH3+BmV4gOj/Tz707JLEB8yA1muSE9jl+:qutIFfqVdH3+BmOBj/n70Fm8HmPi+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks