General

  • Target

    JaffaCakes118_52e330e3855744ad7120e6ad39dff2b8a6c3bbdb217164fd7443fc8c06f54e1a

  • Size

    291KB

  • Sample

    241223-tsatbavjht

  • MD5

    4e6018f8aa4e23f9682ad29bbe4bff86

  • SHA1

    314329b8e37fed0104cf518ed7e221c77f78a217

  • SHA256

    52e330e3855744ad7120e6ad39dff2b8a6c3bbdb217164fd7443fc8c06f54e1a

  • SHA512

    f265ffb7ca36419f45c2cbc28cd14a26e0720355e6950426ca357c57e67c671252f2220a6dc6d236185129951796e9cd352dd2e5425acd9024a4806692a0d743

  • SSDEEP

    6144:C9DzZDKZGtx0NSBXbTW8WxQs9dcBHKNUp/rcAst:ClztVtxNrtGQs9dcBHKNAst

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_52e330e3855744ad7120e6ad39dff2b8a6c3bbdb217164fd7443fc8c06f54e1a

    • Size

      291KB

    • MD5

      4e6018f8aa4e23f9682ad29bbe4bff86

    • SHA1

      314329b8e37fed0104cf518ed7e221c77f78a217

    • SHA256

      52e330e3855744ad7120e6ad39dff2b8a6c3bbdb217164fd7443fc8c06f54e1a

    • SHA512

      f265ffb7ca36419f45c2cbc28cd14a26e0720355e6950426ca357c57e67c671252f2220a6dc6d236185129951796e9cd352dd2e5425acd9024a4806692a0d743

    • SSDEEP

      6144:C9DzZDKZGtx0NSBXbTW8WxQs9dcBHKNUp/rcAst:ClztVtxNrtGQs9dcBHKNAst

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks