General

  • Target

    JaffaCakes118_42c84b049e03a1bad9a8267d9843dc42c8f83be2128725250b56c0ee5d9e5777

  • Size

    327KB

  • Sample

    241223-s777patmgv

  • MD5

    31bdff595ea41c72b706d487bbe4631b

  • SHA1

    f362b7edad57b5d18afba3b0a3917aad800e4985

  • SHA256

    42c84b049e03a1bad9a8267d9843dc42c8f83be2128725250b56c0ee5d9e5777

  • SHA512

    ae6c7a9cd5180076e72501cc0147df2e03e8016027d3f883617399159345696ecf9782721aab4f91541f0be9b25ce9b64f63a5dc28a6ede940020c73098154f7

  • SSDEEP

    6144:O+IZcqfRAQbNAJIZMVfwoFFTnDLu2EfyrprpuxcmqA:OTZcqfqJBnDLu2E+pV0

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_42c84b049e03a1bad9a8267d9843dc42c8f83be2128725250b56c0ee5d9e5777

    • Size

      327KB

    • MD5

      31bdff595ea41c72b706d487bbe4631b

    • SHA1

      f362b7edad57b5d18afba3b0a3917aad800e4985

    • SHA256

      42c84b049e03a1bad9a8267d9843dc42c8f83be2128725250b56c0ee5d9e5777

    • SHA512

      ae6c7a9cd5180076e72501cc0147df2e03e8016027d3f883617399159345696ecf9782721aab4f91541f0be9b25ce9b64f63a5dc28a6ede940020c73098154f7

    • SSDEEP

      6144:O+IZcqfRAQbNAJIZMVfwoFFTnDLu2EfyrprpuxcmqA:OTZcqfqJBnDLu2E+pV0

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks