General

  • Target

    JaffaCakes118_14849372bfd7471f0684c9953a212f3374b7ab1fe9c374aaae7e08d37437a9a2

  • Size

    294KB

  • Sample

    241224-abs4sawjex

  • MD5

    f762df0ed1bb2b3fcfcf31127038780c

  • SHA1

    92508e1b8e3de24fb705cecb9ec15c8200a71ac4

  • SHA256

    14849372bfd7471f0684c9953a212f3374b7ab1fe9c374aaae7e08d37437a9a2

  • SHA512

    9cbc2d7c59fddb141f1f858c7ef2e0e720bf974e947e3bfcaaf7e63d4064005b2eedaab29cfe5385a32f905e307c4d536d34fcdf7dfe410d082c053dc4aa3dea

  • SSDEEP

    6144:vuSscn6byernqIeA+ZyCVZWmZGSXuZet0yy8YobdBSpKjE/:WL0eGVZJGSXuZet0yy8YSSp9

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_14849372bfd7471f0684c9953a212f3374b7ab1fe9c374aaae7e08d37437a9a2

    • Size

      294KB

    • MD5

      f762df0ed1bb2b3fcfcf31127038780c

    • SHA1

      92508e1b8e3de24fb705cecb9ec15c8200a71ac4

    • SHA256

      14849372bfd7471f0684c9953a212f3374b7ab1fe9c374aaae7e08d37437a9a2

    • SHA512

      9cbc2d7c59fddb141f1f858c7ef2e0e720bf974e947e3bfcaaf7e63d4064005b2eedaab29cfe5385a32f905e307c4d536d34fcdf7dfe410d082c053dc4aa3dea

    • SSDEEP

      6144:vuSscn6byernqIeA+ZyCVZWmZGSXuZet0yy8YobdBSpKjE/:WL0eGVZJGSXuZet0yy8YSSp9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks