General

  • Target

    JaffaCakes118_be694b37daf2d5b9b8491a0289a192fe18e05d2b50f98376b27c78ef146a6b76

  • Size

    342KB

  • Sample

    241221-zkdg5ayrbs

  • MD5

    1518b03ff2731322f2bcf759be3b9d41

  • SHA1

    fc8eee7fe594cbfc5c827d76b56717df1e27b94c

  • SHA256

    be694b37daf2d5b9b8491a0289a192fe18e05d2b50f98376b27c78ef146a6b76

  • SHA512

    da5b53754940e1df8a63607af8c8f8d2bf4cec4e12744efcf531aa94a62790dd29f73f5f9fedb618f331953d238acd08447fa6c4054c3d2c20814b6905f544c9

  • SSDEEP

    6144:zEwxmgAdC3H8HkHwuIpk4BUoBJnoT7Y6JhAr4Bk:zb5UC3hQuIK4BUoBJnoT7YB4B

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_be694b37daf2d5b9b8491a0289a192fe18e05d2b50f98376b27c78ef146a6b76

    • Size

      342KB

    • MD5

      1518b03ff2731322f2bcf759be3b9d41

    • SHA1

      fc8eee7fe594cbfc5c827d76b56717df1e27b94c

    • SHA256

      be694b37daf2d5b9b8491a0289a192fe18e05d2b50f98376b27c78ef146a6b76

    • SHA512

      da5b53754940e1df8a63607af8c8f8d2bf4cec4e12744efcf531aa94a62790dd29f73f5f9fedb618f331953d238acd08447fa6c4054c3d2c20814b6905f544c9

    • SSDEEP

      6144:zEwxmgAdC3H8HkHwuIpk4BUoBJnoT7Y6JhAr4Bk:zb5UC3hQuIK4BUoBJnoT7YB4B

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks