General

  • Target

    JaffaCakes118_fe8eab1915f8ab5c7b8de91e09fae88b4c98626c317e7d61d6acb116fe29efef

  • Size

    285KB

  • Sample

    241224-mkkvzsvpfp

  • MD5

    9ae18937bee35e429d3cf973cc2c66bc

  • SHA1

    a2c8feadc6ef096d7de3d3ba138409e8cd4631eb

  • SHA256

    fe8eab1915f8ab5c7b8de91e09fae88b4c98626c317e7d61d6acb116fe29efef

  • SHA512

    e34fd5eafa5c742729dffdbe401d5d10b5231fb90a2038c7a7f856e87a82f832e4c1bf67be2ae7af86d679c2fce6b786622b8ec088f990b759e6b16b6194fbd1

  • SSDEEP

    6144:yKFbjOROKji302CSXuzbgwu6L7ITsqSigaTwVf:FbjOROMYRxXunnn7s

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_fe8eab1915f8ab5c7b8de91e09fae88b4c98626c317e7d61d6acb116fe29efef

    • Size

      285KB

    • MD5

      9ae18937bee35e429d3cf973cc2c66bc

    • SHA1

      a2c8feadc6ef096d7de3d3ba138409e8cd4631eb

    • SHA256

      fe8eab1915f8ab5c7b8de91e09fae88b4c98626c317e7d61d6acb116fe29efef

    • SHA512

      e34fd5eafa5c742729dffdbe401d5d10b5231fb90a2038c7a7f856e87a82f832e4c1bf67be2ae7af86d679c2fce6b786622b8ec088f990b759e6b16b6194fbd1

    • SSDEEP

      6144:yKFbjOROKji302CSXuzbgwu6L7ITsqSigaTwVf:FbjOROMYRxXunnn7s

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks