General

  • Target

    JaffaCakes118_e63d10ca0b11dcead0cbe59e6ffc0f697045cc855ccdfed26e09cf8fd31bea44

  • Size

    187KB

  • Sample

    241222-zskleayndz

  • MD5

    1f11ea2297bb82debf1add03f5efcc09

  • SHA1

    42b2004c178bf4d019d2042eacaf72071e685594

  • SHA256

    e63d10ca0b11dcead0cbe59e6ffc0f697045cc855ccdfed26e09cf8fd31bea44

  • SHA512

    909d8bd8a7981c5197b417b0b4c283e92b32efa34eb22c1bd328f1a9bf4bf2b9b0c5fa896eb3e55229b796e1d23744e2ebc2551f6ddc4e6a6720d44b99240e70

  • SSDEEP

    3072:EC7e/jDuFi2WiN38n69XJz7AdTiraSuzIFzmpZa9uD6Vdyhkk:ELLDuFi2WiN3BrXmwVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_e63d10ca0b11dcead0cbe59e6ffc0f697045cc855ccdfed26e09cf8fd31bea44

    • Size

      187KB

    • MD5

      1f11ea2297bb82debf1add03f5efcc09

    • SHA1

      42b2004c178bf4d019d2042eacaf72071e685594

    • SHA256

      e63d10ca0b11dcead0cbe59e6ffc0f697045cc855ccdfed26e09cf8fd31bea44

    • SHA512

      909d8bd8a7981c5197b417b0b4c283e92b32efa34eb22c1bd328f1a9bf4bf2b9b0c5fa896eb3e55229b796e1d23744e2ebc2551f6ddc4e6a6720d44b99240e70

    • SSDEEP

      3072:EC7e/jDuFi2WiN38n69XJz7AdTiraSuzIFzmpZa9uD6Vdyhkk:ELLDuFi2WiN3BrXmwVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks