General

  • Target

    JaffaCakes118_b52d830b3fc856cc40c8c061fc594dbf22cacf7bb440e159f0a61737abc7592a

  • Size

    212KB

  • Sample

    241222-jhcvtazjfx

  • MD5

    1312ee3ef6696123f14c35e1bcaf57e9

  • SHA1

    701d67afbdbd1dc90321b4e4f6be95566aa83d52

  • SHA256

    b52d830b3fc856cc40c8c061fc594dbf22cacf7bb440e159f0a61737abc7592a

  • SHA512

    94e4493e4776c76b2748d7a93064020dd001ab533b1f48aa738d884f9ff8967bdd01d778f803edce5ececbcd47f18acdbb1f4360f68aff575a742731dcb30967

  • SSDEEP

    6144:ZN0TNRkdq8G+ZYdX/2+VxjKFW7ITsquwVf:D0T7kdq8EdXres7

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_b52d830b3fc856cc40c8c061fc594dbf22cacf7bb440e159f0a61737abc7592a

    • Size

      212KB

    • MD5

      1312ee3ef6696123f14c35e1bcaf57e9

    • SHA1

      701d67afbdbd1dc90321b4e4f6be95566aa83d52

    • SHA256

      b52d830b3fc856cc40c8c061fc594dbf22cacf7bb440e159f0a61737abc7592a

    • SHA512

      94e4493e4776c76b2748d7a93064020dd001ab533b1f48aa738d884f9ff8967bdd01d778f803edce5ececbcd47f18acdbb1f4360f68aff575a742731dcb30967

    • SSDEEP

      6144:ZN0TNRkdq8G+ZYdX/2+VxjKFW7ITsquwVf:D0T7kdq8EdXres7

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks