General

  • Target

    JaffaCakes118_8de70b11b35097da33e0d5dd0e501ab30c1e7848bfa1339ae111208720412a2e

  • Size

    169KB

  • Sample

    241224-dwmdhs1jcv

  • MD5

    ae26a7d97f24de1ccb18f6e8d5c2b17e

  • SHA1

    db1699530d888798f5755c6fa49b510735ee382c

  • SHA256

    8de70b11b35097da33e0d5dd0e501ab30c1e7848bfa1339ae111208720412a2e

  • SHA512

    08c8c53f698d20167058d26b973c95fe639b7f2b7812c3b8b4ee6a89088d9917ec0ea31a3d34592400976bf2b3419993d7b5207830e396bc89701c5b69b8e723

  • SSDEEP

    3072:ZINEppMfEjnjh9fzRq6aMLsKdGtkZwA/e22:ONEppMfEhLq69ssAkZ0J

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_8de70b11b35097da33e0d5dd0e501ab30c1e7848bfa1339ae111208720412a2e

    • Size

      169KB

    • MD5

      ae26a7d97f24de1ccb18f6e8d5c2b17e

    • SHA1

      db1699530d888798f5755c6fa49b510735ee382c

    • SHA256

      8de70b11b35097da33e0d5dd0e501ab30c1e7848bfa1339ae111208720412a2e

    • SHA512

      08c8c53f698d20167058d26b973c95fe639b7f2b7812c3b8b4ee6a89088d9917ec0ea31a3d34592400976bf2b3419993d7b5207830e396bc89701c5b69b8e723

    • SSDEEP

      3072:ZINEppMfEjnjh9fzRq6aMLsKdGtkZwA/e22:ONEppMfEhLq69ssAkZ0J

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks