General

  • Target

    JaffaCakes118_da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87

  • Size

    254KB

  • Sample

    241223-3mjnpsvncy

  • MD5

    e69ff98ea2f9d45fc961b31e8225dfff

  • SHA1

    0e30d3b1d5a120bef7d9ac10ec847c31dde82765

  • SHA256

    da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87

  • SHA512

    62d10ec5ba321c2f04587a1a4255e1c2395557ce46a39866823b807f4a7062c6bb7309c77bb82e08b89526e3fdce157b9d1df25c540d0e2ef3276e09be43bf58

  • SSDEEP

    3072:v0Dpf7yqdUqSSWixrhMMp5JvpmzI5RjRMF7wgBdOXCMueDbhacvPhEwrV56I/:YS3iIMpbpmz0jiFTdOXJu01dvZRN/

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87

    • Size

      254KB

    • MD5

      e69ff98ea2f9d45fc961b31e8225dfff

    • SHA1

      0e30d3b1d5a120bef7d9ac10ec847c31dde82765

    • SHA256

      da14cd2e1f896bcd043fce50c512500fa036a68be25bf744dbed94c78e971b87

    • SHA512

      62d10ec5ba321c2f04587a1a4255e1c2395557ce46a39866823b807f4a7062c6bb7309c77bb82e08b89526e3fdce157b9d1df25c540d0e2ef3276e09be43bf58

    • SSDEEP

      3072:v0Dpf7yqdUqSSWixrhMMp5JvpmzI5RjRMF7wgBdOXCMueDbhacvPhEwrV56I/:YS3iIMpbpmz0jiFTdOXJu01dvZRN/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks