General

  • Target

    JaffaCakes118_da4b9d0645088f4d03ac21095c41eae79158fdf64de528c81db6ca1a860d081a

  • Size

    316KB

  • Sample

    241222-ghlrlswlgv

  • MD5

    c7051b7cbb880cede34b869a26552871

  • SHA1

    21ab89fc5678a17b8fbe60df0cabdecd541a8a12

  • SHA256

    da4b9d0645088f4d03ac21095c41eae79158fdf64de528c81db6ca1a860d081a

  • SHA512

    4ae131e2198ba5d49b3657794bdbebb5ceabf3c08727daefe2a18aef6bb41ce8efca6f23c89d33e394f8577fec7c488088558870977d608b526280c7937b6d6f

  • SSDEEP

    6144:bDJdGfXu5oWKgy2+6PgZ4HV0gGZIDu6+gKxrLO:C+5oWKgy2+6PgZ4HV0gGZIIgKw

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_da4b9d0645088f4d03ac21095c41eae79158fdf64de528c81db6ca1a860d081a

    • Size

      316KB

    • MD5

      c7051b7cbb880cede34b869a26552871

    • SHA1

      21ab89fc5678a17b8fbe60df0cabdecd541a8a12

    • SHA256

      da4b9d0645088f4d03ac21095c41eae79158fdf64de528c81db6ca1a860d081a

    • SHA512

      4ae131e2198ba5d49b3657794bdbebb5ceabf3c08727daefe2a18aef6bb41ce8efca6f23c89d33e394f8577fec7c488088558870977d608b526280c7937b6d6f

    • SSDEEP

      6144:bDJdGfXu5oWKgy2+6PgZ4HV0gGZIDu6+gKxrLO:C+5oWKgy2+6PgZ4HV0gGZIIgKw

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks