General

  • Target

    JaffaCakes118_53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce

  • Size

    337KB

  • Sample

    241225-dwcjbawmdy

  • MD5

    1e438cc75c27318882e50db6524f3553

  • SHA1

    aa0ac3a45ca2fa037c81eedad6807eb480052cf7

  • SHA256

    53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce

  • SHA512

    a43dc2e12593f61d69d33bf04bf9c91824fc7c98cad7d2c78bb7469139ad08232799eefa813999b2d06f32b18428801df0970d58ca8237115b5d66afbc690d9a

  • SSDEEP

    6144:Ed44FG63LsU8ITQQgb4tZqlZ1YQldwxoKbLyY:iFG63LIrQguolZWQjZiLv

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce

    • Size

      337KB

    • MD5

      1e438cc75c27318882e50db6524f3553

    • SHA1

      aa0ac3a45ca2fa037c81eedad6807eb480052cf7

    • SHA256

      53a0d8df737edd824241066638b4ecc859f285e2c74e391c7c7b9dc1e1c640ce

    • SHA512

      a43dc2e12593f61d69d33bf04bf9c91824fc7c98cad7d2c78bb7469139ad08232799eefa813999b2d06f32b18428801df0970d58ca8237115b5d66afbc690d9a

    • SSDEEP

      6144:Ed44FG63LsU8ITQQgb4tZqlZ1YQldwxoKbLyY:iFG63LIrQguolZWQjZiLv

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks