General

  • Target

    JaffaCakes118_9fe9e8413e68ba926a5cf92ea3f07a503035a65d479cb0930b10219c52f7bb11

  • Size

    291KB

  • Sample

    241224-28eq7szpbx

  • MD5

    059b6ca71cc6eddf47745e45c5134b0b

  • SHA1

    9f8495fc5daea7fb6ffeca5abf461d9b03c83c66

  • SHA256

    9fe9e8413e68ba926a5cf92ea3f07a503035a65d479cb0930b10219c52f7bb11

  • SHA512

    60825f2453eb0137bee314f1ccba4a99f192cd1bced1fcfbe55b0a1fb10b5b7276d078b4f346ffb524ebba5fe1042bb3e2f846c4e2f7825c0f06b2556d9570d9

  • SSDEEP

    6144:Vd+g4P3tZ2kWcrncIUSXuZet0ySbaHPQLx5qe28g:jgX2kbrn1USXuZet0ySbaSx5qJv

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_9fe9e8413e68ba926a5cf92ea3f07a503035a65d479cb0930b10219c52f7bb11

    • Size

      291KB

    • MD5

      059b6ca71cc6eddf47745e45c5134b0b

    • SHA1

      9f8495fc5daea7fb6ffeca5abf461d9b03c83c66

    • SHA256

      9fe9e8413e68ba926a5cf92ea3f07a503035a65d479cb0930b10219c52f7bb11

    • SHA512

      60825f2453eb0137bee314f1ccba4a99f192cd1bced1fcfbe55b0a1fb10b5b7276d078b4f346ffb524ebba5fe1042bb3e2f846c4e2f7825c0f06b2556d9570d9

    • SSDEEP

      6144:Vd+g4P3tZ2kWcrncIUSXuZet0ySbaHPQLx5qe28g:jgX2kbrn1USXuZet0ySbaSx5qJv

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks