General

  • Target

    JaffaCakes118_c1104189cca07cf7cacd699a5f1bf9389162586e6c65c1e9a52f9c3a1676021f

  • Size

    164KB

  • Sample

    241223-vxv6gswkhl

  • MD5

    587a7cf775cd8a74be2baccb695e31d4

  • SHA1

    010568b6ae0c2ed0d9ff092be2520b3b524a5455

  • SHA256

    c1104189cca07cf7cacd699a5f1bf9389162586e6c65c1e9a52f9c3a1676021f

  • SHA512

    9975b441d733378a5f4be3b1d24e422a17ccfe5a5c5af5c2724676038aaffe465fe69323131e0c460bad9a1fcc18fa1154ff6bc3fd641a9aa56be40555952467

  • SSDEEP

    3072:YRerFrOZe6EAoFOTSRKAIIOVFR28YNeP4mgFiByKEh2:Txrqe6OFiSkvIOVFQfmiiBIQ

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_c1104189cca07cf7cacd699a5f1bf9389162586e6c65c1e9a52f9c3a1676021f

    • Size

      164KB

    • MD5

      587a7cf775cd8a74be2baccb695e31d4

    • SHA1

      010568b6ae0c2ed0d9ff092be2520b3b524a5455

    • SHA256

      c1104189cca07cf7cacd699a5f1bf9389162586e6c65c1e9a52f9c3a1676021f

    • SHA512

      9975b441d733378a5f4be3b1d24e422a17ccfe5a5c5af5c2724676038aaffe465fe69323131e0c460bad9a1fcc18fa1154ff6bc3fd641a9aa56be40555952467

    • SSDEEP

      3072:YRerFrOZe6EAoFOTSRKAIIOVFR28YNeP4mgFiByKEh2:Txrqe6OFiSkvIOVFQfmiiBIQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks