General

  • Target

    JaffaCakes118_6fe7424d5f4d4ce6c5a5eef99cad1e1ffb0f4dad3ddbb932546a3e99286dc9bb

  • Size

    160KB

  • Sample

    241225-c89h5svpft

  • MD5

    f8751659a78b753753c6cd06c414358e

  • SHA1

    d8b354927a734f92cd0d3972cbacef7e14ebd046

  • SHA256

    6fe7424d5f4d4ce6c5a5eef99cad1e1ffb0f4dad3ddbb932546a3e99286dc9bb

  • SHA512

    beac5506be29a2e9543250f81158cf9714c8a4d01690f3e3756bfa4ecfe7431327c7ff061cf4ea49aa8e16061c4d43d89cfa97f9bcd9843a1e798fd01dc99a6a

  • SSDEEP

    1536:Ra2VSyQsJgXWheKALv54FZ9YsnVGMkSflFUG43TgLjDo81l+UVwvdj6peviBTPmC:clNGUja68XU2EUicgiCSYxUAVGh0a

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_6fe7424d5f4d4ce6c5a5eef99cad1e1ffb0f4dad3ddbb932546a3e99286dc9bb

    • Size

      160KB

    • MD5

      f8751659a78b753753c6cd06c414358e

    • SHA1

      d8b354927a734f92cd0d3972cbacef7e14ebd046

    • SHA256

      6fe7424d5f4d4ce6c5a5eef99cad1e1ffb0f4dad3ddbb932546a3e99286dc9bb

    • SHA512

      beac5506be29a2e9543250f81158cf9714c8a4d01690f3e3756bfa4ecfe7431327c7ff061cf4ea49aa8e16061c4d43d89cfa97f9bcd9843a1e798fd01dc99a6a

    • SSDEEP

      1536:Ra2VSyQsJgXWheKALv54FZ9YsnVGMkSflFUG43TgLjDo81l+UVwvdj6peviBTPmC:clNGUja68XU2EUicgiCSYxUAVGh0a

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks