General

  • Target

    JaffaCakes118_488dd7508bcba135c824c79e64f40cb6a4dbc150097999290b570b04fc68e919

  • Size

    337KB

  • Sample

    241222-bsyk9sxqak

  • MD5

    2488336d76b57d7a3e72980a209d3a0a

  • SHA1

    09c54507231eff98d169ee13a080727e4c31144c

  • SHA256

    488dd7508bcba135c824c79e64f40cb6a4dbc150097999290b570b04fc68e919

  • SHA512

    93fccad60a145216754473ef9da8309b9c2450eba2ceb21af4bd25d4e8db2c729e5adcbb050b603d8921341f732094929ce78bd8519ec18f3aac7a98de40b917

  • SSDEEP

    6144:39Gu9W43Ah8//SqtsaHlgYnOyLGFx6qv4:Do43AhEKqtsaHCDyLGF3v4

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_488dd7508bcba135c824c79e64f40cb6a4dbc150097999290b570b04fc68e919

    • Size

      337KB

    • MD5

      2488336d76b57d7a3e72980a209d3a0a

    • SHA1

      09c54507231eff98d169ee13a080727e4c31144c

    • SHA256

      488dd7508bcba135c824c79e64f40cb6a4dbc150097999290b570b04fc68e919

    • SHA512

      93fccad60a145216754473ef9da8309b9c2450eba2ceb21af4bd25d4e8db2c729e5adcbb050b603d8921341f732094929ce78bd8519ec18f3aac7a98de40b917

    • SSDEEP

      6144:39Gu9W43Ah8//SqtsaHlgYnOyLGFx6qv4:Do43AhEKqtsaHCDyLGF3v4

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks