General

  • Target

    JaffaCakes118_1b5c3e8a1f6ba47e6f30f78c44fdba79ac300c89530b032572cffd2af7ae6943

  • Size

    210KB

  • Sample

    241225-a9kv3asnhr

  • MD5

    0216b4518035394117782852e6929b39

  • SHA1

    aa1f06ce86237f35f1a18c93801f5666d04e615e

  • SHA256

    1b5c3e8a1f6ba47e6f30f78c44fdba79ac300c89530b032572cffd2af7ae6943

  • SHA512

    c20ac3781ab4e2256f72ec6bec795bba99ce08d71dabc4afe2557a8425a78992b51fb81137dc644df462c408c7998d7200934d5a675e3204a59af0529d566cf7

  • SSDEEP

    3072:j7sP8bp8Fj2+y8FdOhTuHwznQLBIHFLv1JWrxpzbgqru2sxkgaBChe:MUt8Fj2cFd4tlLNJuzbgwujiga

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_1b5c3e8a1f6ba47e6f30f78c44fdba79ac300c89530b032572cffd2af7ae6943

    • Size

      210KB

    • MD5

      0216b4518035394117782852e6929b39

    • SHA1

      aa1f06ce86237f35f1a18c93801f5666d04e615e

    • SHA256

      1b5c3e8a1f6ba47e6f30f78c44fdba79ac300c89530b032572cffd2af7ae6943

    • SHA512

      c20ac3781ab4e2256f72ec6bec795bba99ce08d71dabc4afe2557a8425a78992b51fb81137dc644df462c408c7998d7200934d5a675e3204a59af0529d566cf7

    • SSDEEP

      3072:j7sP8bp8Fj2+y8FdOhTuHwznQLBIHFLv1JWrxpzbgqru2sxkgaBChe:MUt8Fj2cFd4tlLNJuzbgwujiga

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks