General

  • Target

    JaffaCakes118_3e3590e27bfb3328e0d47c2c8de5c63b42ec4c397c845bd8e240bf67cb36585c

  • Size

    333KB

  • Sample

    241221-wv93asvrc1

  • MD5

    93085b8c3f03829fe5c2d7c2c63d8cf3

  • SHA1

    cb2ced04dc921e9ad5668238b6b438e8705fd3e6

  • SHA256

    3e3590e27bfb3328e0d47c2c8de5c63b42ec4c397c845bd8e240bf67cb36585c

  • SHA512

    070c54fda3a741c508fe3224883a18a9f219d0c4d633497a0dab368d6cc74843e916f9af41c54531a3204941cb29c765aa3f00e69e60d974cbbc177a02f52043

  • SSDEEP

    6144:BoFge0thkcRZhJOdKU1QrHpbSmI8WmL5B:OSvtOcRZXOdKU1qJbSmUg

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_3e3590e27bfb3328e0d47c2c8de5c63b42ec4c397c845bd8e240bf67cb36585c

    • Size

      333KB

    • MD5

      93085b8c3f03829fe5c2d7c2c63d8cf3

    • SHA1

      cb2ced04dc921e9ad5668238b6b438e8705fd3e6

    • SHA256

      3e3590e27bfb3328e0d47c2c8de5c63b42ec4c397c845bd8e240bf67cb36585c

    • SHA512

      070c54fda3a741c508fe3224883a18a9f219d0c4d633497a0dab368d6cc74843e916f9af41c54531a3204941cb29c765aa3f00e69e60d974cbbc177a02f52043

    • SSDEEP

      6144:BoFge0thkcRZhJOdKU1QrHpbSmI8WmL5B:OSvtOcRZXOdKU1qJbSmUg

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks