General

  • Target

    JaffaCakes118_999810effa8e1b6403ed675a4fe4b8dac3fc79bf3ae7f3dbf538c7126fd62f4d

  • Size

    210KB

  • Sample

    241223-thl4latqhp

  • MD5

    29405d13a965b33a9d00604f1f33f796

  • SHA1

    2534e39a8b8dc5a81a5f7863d0d5a2c3db342194

  • SHA256

    999810effa8e1b6403ed675a4fe4b8dac3fc79bf3ae7f3dbf538c7126fd62f4d

  • SHA512

    f62e13a60316c0a28394255d7479d756150c3d3771dbfc79b69350f7a1692aab5967d029488d6d2e687e38d02dcf6abf5f0e582f7148b940504e8b36f50251bf

  • SSDEEP

    3072:B7o+8bY15UTpVVU7JI7eSSIZ5Rk06UCOt6Wrxpzbgqru2sxkgaBChn:GDE15UTW7cS45cU76uzbgwujiga

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_999810effa8e1b6403ed675a4fe4b8dac3fc79bf3ae7f3dbf538c7126fd62f4d

    • Size

      210KB

    • MD5

      29405d13a965b33a9d00604f1f33f796

    • SHA1

      2534e39a8b8dc5a81a5f7863d0d5a2c3db342194

    • SHA256

      999810effa8e1b6403ed675a4fe4b8dac3fc79bf3ae7f3dbf538c7126fd62f4d

    • SHA512

      f62e13a60316c0a28394255d7479d756150c3d3771dbfc79b69350f7a1692aab5967d029488d6d2e687e38d02dcf6abf5f0e582f7148b940504e8b36f50251bf

    • SSDEEP

      3072:B7o+8bY15UTpVVU7JI7eSSIZ5Rk06UCOt6Wrxpzbgqru2sxkgaBChn:GDE15UTW7cS45cU76uzbgwujiga

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks