General

  • Target

    JaffaCakes118_9be48fcae3b5f4502ad08eb6ae634a21c40182308ce1a43fb8702443ff58889f

  • Size

    236KB

  • Sample

    241222-nsbgyswphw

  • MD5

    a10cfebcac6052f54fae1e5ba6ddd760

  • SHA1

    dac2ac4b67ba2b0ef2e02afd2740d11d492b7415

  • SHA256

    9be48fcae3b5f4502ad08eb6ae634a21c40182308ce1a43fb8702443ff58889f

  • SHA512

    2fba121bfa8bc842103e6616a7305928664b6cae03b65ca5849dc1dbfa3e10ff2b8b733ea15bec8df74addf97a87a31a067e2f8c393532523e01e1c24273aca4

  • SSDEEP

    6144:CLQdlDKqaGPkALoMQIOuzbgwujigaLwVf:CLQd1KqaOkw8IOunnb

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_9be48fcae3b5f4502ad08eb6ae634a21c40182308ce1a43fb8702443ff58889f

    • Size

      236KB

    • MD5

      a10cfebcac6052f54fae1e5ba6ddd760

    • SHA1

      dac2ac4b67ba2b0ef2e02afd2740d11d492b7415

    • SHA256

      9be48fcae3b5f4502ad08eb6ae634a21c40182308ce1a43fb8702443ff58889f

    • SHA512

      2fba121bfa8bc842103e6616a7305928664b6cae03b65ca5849dc1dbfa3e10ff2b8b733ea15bec8df74addf97a87a31a067e2f8c393532523e01e1c24273aca4

    • SSDEEP

      6144:CLQdlDKqaGPkALoMQIOuzbgwujigaLwVf:CLQd1KqaOkw8IOunnb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks