General

  • Target

    JaffaCakes118_f93d0887b4bea5ce3be804e193b29a151b4c533b86f83eb871ec154b5e461c7a

  • Size

    187KB

  • Sample

    241222-ekwngssnhs

  • MD5

    27b7fa84e7765abcb03f3d7b8ac3699b

  • SHA1

    eabf162f38ad7bcaa862e8d11a8ba5560fba6c61

  • SHA256

    f93d0887b4bea5ce3be804e193b29a151b4c533b86f83eb871ec154b5e461c7a

  • SHA512

    d2c3e3315f97e23af2ef2ce92687ec9e96cc0703bdb3cf0834dc2d8ab9ad18e3e15dc994923c2b52e311edc74696089fd85a3b74224a0a17ca4eb77b9fb8cc88

  • SSDEEP

    3072:Z7ojA4DTPiMhkeIlqT0bkbZsjGp23YXoI/mmBHSO/YpZa9uD6Vdyhk9:4A4DTPiMtIQT0I5+YXoI/mGR/YwVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_f93d0887b4bea5ce3be804e193b29a151b4c533b86f83eb871ec154b5e461c7a

    • Size

      187KB

    • MD5

      27b7fa84e7765abcb03f3d7b8ac3699b

    • SHA1

      eabf162f38ad7bcaa862e8d11a8ba5560fba6c61

    • SHA256

      f93d0887b4bea5ce3be804e193b29a151b4c533b86f83eb871ec154b5e461c7a

    • SHA512

      d2c3e3315f97e23af2ef2ce92687ec9e96cc0703bdb3cf0834dc2d8ab9ad18e3e15dc994923c2b52e311edc74696089fd85a3b74224a0a17ca4eb77b9fb8cc88

    • SSDEEP

      3072:Z7ojA4DTPiMhkeIlqT0bkbZsjGp23YXoI/mmBHSO/YpZa9uD6Vdyhk9:4A4DTPiMtIQT0I5+YXoI/mGR/YwVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks