General

  • Target

    JaffaCakes118_27ef0d08d288bc7b44dc6676837bf79d4b75a8515e427c58510c51adf141660f

  • Size

    272KB

  • Sample

    241222-crxg9azjaw

  • MD5

    5926f552991160621e453a9a61fcac49

  • SHA1

    3d19c882fb19d936519e936da722b62aea6959eb

  • SHA256

    27ef0d08d288bc7b44dc6676837bf79d4b75a8515e427c58510c51adf141660f

  • SHA512

    44cab2bf4126e8224ce88906bfc565f59449da8e802e3000b60e991f21d694a3c9b1e4483c5b6b24ea13e1e910ad274d31af5f9b8390ffdc5d23ba283c6fae2b

  • SSDEEP

    6144:wkjwNM3Y+ilFxjBGcdCMcXPxuzbgwu6L7ITsqSigaTwVf:xwNMoFXNGcdCMcXPxunnn7s

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_27ef0d08d288bc7b44dc6676837bf79d4b75a8515e427c58510c51adf141660f

    • Size

      272KB

    • MD5

      5926f552991160621e453a9a61fcac49

    • SHA1

      3d19c882fb19d936519e936da722b62aea6959eb

    • SHA256

      27ef0d08d288bc7b44dc6676837bf79d4b75a8515e427c58510c51adf141660f

    • SHA512

      44cab2bf4126e8224ce88906bfc565f59449da8e802e3000b60e991f21d694a3c9b1e4483c5b6b24ea13e1e910ad274d31af5f9b8390ffdc5d23ba283c6fae2b

    • SSDEEP

      6144:wkjwNM3Y+ilFxjBGcdCMcXPxuzbgwu6L7ITsqSigaTwVf:xwNMoFXNGcdCMcXPxunnn7s

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks