General

  • Target

    JaffaCakes118_9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942

  • Size

    291KB

  • Sample

    241222-ktthda1qgy

  • MD5

    d19143b5b307f466773d78beaffdfddd

  • SHA1

    3a0c0f85cac9a9c190d1b634e4a8d1b9ce139c62

  • SHA256

    9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942

  • SHA512

    1767680e382d3879beda7361f844e75401714f33ede60c40a23715b53174f325307b0d7ed6228af25c4fa7ee15080f2e75cac40d08bb9bc17a05ad5ab1ab9f41

  • SSDEEP

    6144:bLAYn+dp6In11uvJXgWxvRma9zxWQYeTGDMwfzh:bMWRI10vJQ+vRma9zxWQEdfzh

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942

    • Size

      291KB

    • MD5

      d19143b5b307f466773d78beaffdfddd

    • SHA1

      3a0c0f85cac9a9c190d1b634e4a8d1b9ce139c62

    • SHA256

      9b847b83bb51c8cf825e4b2fc385dab4e0e2c518029a1cedd8575f5f581bc942

    • SHA512

      1767680e382d3879beda7361f844e75401714f33ede60c40a23715b53174f325307b0d7ed6228af25c4fa7ee15080f2e75cac40d08bb9bc17a05ad5ab1ab9f41

    • SSDEEP

      6144:bLAYn+dp6In11uvJXgWxvRma9zxWQYeTGDMwfzh:bMWRI10vJQ+vRma9zxWQEdfzh

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks