General

  • Target

    JaffaCakes118_fda9c52e5f041eb6319b4cdbb40394f2bd79fa874c08b64dd7a263ec4e2787cb

  • Size

    187KB

  • Sample

    241222-ft2frsvmev

  • MD5

    d4e72c3cedb1d55b2e305c35bab67f9b

  • SHA1

    fd954e6d944b39bf3696c3fc358ea97c76165e47

  • SHA256

    fda9c52e5f041eb6319b4cdbb40394f2bd79fa874c08b64dd7a263ec4e2787cb

  • SHA512

    86b31e0e3930a427b549951476ae010b2d9632ff2c651798f50c6964a432741189b88a424d53e84ac8ebd0cd26219935ad61c48f5245ba0871be0fdf5205ff1f

  • SSDEEP

    3072:F7IjKaF6/lWkDI90YEM/ToigZzx0cBapZa9uD6Vdyhkp:4KaF6/lWkDtLNi20cBawVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_fda9c52e5f041eb6319b4cdbb40394f2bd79fa874c08b64dd7a263ec4e2787cb

    • Size

      187KB

    • MD5

      d4e72c3cedb1d55b2e305c35bab67f9b

    • SHA1

      fd954e6d944b39bf3696c3fc358ea97c76165e47

    • SHA256

      fda9c52e5f041eb6319b4cdbb40394f2bd79fa874c08b64dd7a263ec4e2787cb

    • SHA512

      86b31e0e3930a427b549951476ae010b2d9632ff2c651798f50c6964a432741189b88a424d53e84ac8ebd0cd26219935ad61c48f5245ba0871be0fdf5205ff1f

    • SSDEEP

      3072:F7IjKaF6/lWkDI90YEM/ToigZzx0cBapZa9uD6Vdyhkp:4KaF6/lWkDtLNi20cBawVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks