General

  • Target

    JaffaCakes118_809511a12696ee0730fad6e5472210cd09ee5b3e42199771e0a785c7d703ccd7

  • Size

    336KB

  • Sample

    241224-vgh6zsspam

  • MD5

    4d7c132fc1fe7e80763fefae0897fe6b

  • SHA1

    213d4abc977acd8c1abce1d68058eb80f2c636bc

  • SHA256

    809511a12696ee0730fad6e5472210cd09ee5b3e42199771e0a785c7d703ccd7

  • SHA512

    5769fd49fe477b5f7194c5bdfd7c1bbd1a755f2537702583fcc8e3517dc49d16832ab5be78098b84be5edf9347f2ebc0afd04ad9cc3bead8c0ed4b99c12f4872

  • SSDEEP

    6144:V6lQKGal6xVvGEWZwcsqpyN+1x+OzzXV:kljhl6n+EWZwcfgWx+Ozz

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_809511a12696ee0730fad6e5472210cd09ee5b3e42199771e0a785c7d703ccd7

    • Size

      336KB

    • MD5

      4d7c132fc1fe7e80763fefae0897fe6b

    • SHA1

      213d4abc977acd8c1abce1d68058eb80f2c636bc

    • SHA256

      809511a12696ee0730fad6e5472210cd09ee5b3e42199771e0a785c7d703ccd7

    • SHA512

      5769fd49fe477b5f7194c5bdfd7c1bbd1a755f2537702583fcc8e3517dc49d16832ab5be78098b84be5edf9347f2ebc0afd04ad9cc3bead8c0ed4b99c12f4872

    • SSDEEP

      6144:V6lQKGal6xVvGEWZwcsqpyN+1x+OzzXV:kljhl6n+EWZwcfgWx+Ozz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks