General

  • Target

    JaffaCakes118_d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4

  • Size

    238KB

  • Sample

    241222-g9rf6sxmdw

  • MD5

    a35144bc26a7d80d9f1ccc75717c4feb

  • SHA1

    f88f2374ddddd4036a0c149ee3d4631912ac367a

  • SHA256

    d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4

  • SHA512

    b99b7d9b6dff84c61f300c18f30e9c1bf97f1cba022717c67b75f7961ed847f6413138ddc3590376f10e2a92f19b0f5793af1e47a89ef897940358ec01fac657

  • SSDEEP

    3072:57QHNeYxb1NOLvV0hroldaFG98PS6XABIWhVggjcGkNIVqI7sxkgaBChMpZa9uDB:sNeWb3wv2pFG8vABNz7ITsq7igavwVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4

    • Size

      238KB

    • MD5

      a35144bc26a7d80d9f1ccc75717c4feb

    • SHA1

      f88f2374ddddd4036a0c149ee3d4631912ac367a

    • SHA256

      d5ba04399baeda12b636b25ff28bb2a3fed82e8fa25e9a2683240685405ebfb4

    • SHA512

      b99b7d9b6dff84c61f300c18f30e9c1bf97f1cba022717c67b75f7961ed847f6413138ddc3590376f10e2a92f19b0f5793af1e47a89ef897940358ec01fac657

    • SSDEEP

      3072:57QHNeYxb1NOLvV0hroldaFG98PS6XABIWhVggjcGkNIVqI7sxkgaBChMpZa9uDB:sNeWb3wv2pFG8vABNz7ITsq7igavwVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks