General

  • Target

    JaffaCakes118_a95db7a0471f2717606aab2a74d677670a01d3ec9f1dd642b278151d19bd1d82

  • Size

    209KB

  • Sample

    241225-env65axlhv

  • MD5

    0d7956955bc6e9a59379be3e1c32b521

  • SHA1

    3c30a13b7338b20537743d2c4f26a3f848895afa

  • SHA256

    a95db7a0471f2717606aab2a74d677670a01d3ec9f1dd642b278151d19bd1d82

  • SHA512

    3e44ec1980dab1e2480e95e1af37a9e865140ce400445e90babdd884885a25f51c9732241fbf4396d84a1c9c253a94947fa38468ad1684e47ae6c511de496c28

  • SSDEEP

    3072:l7o+8bY15UT/8c4UhnRc6OAK4MdHU0qiRHJWrxpzbgqru2sxkgaBChH:CDE15UTk+cKK4MOUJuzbgwujiga

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_a95db7a0471f2717606aab2a74d677670a01d3ec9f1dd642b278151d19bd1d82

    • Size

      209KB

    • MD5

      0d7956955bc6e9a59379be3e1c32b521

    • SHA1

      3c30a13b7338b20537743d2c4f26a3f848895afa

    • SHA256

      a95db7a0471f2717606aab2a74d677670a01d3ec9f1dd642b278151d19bd1d82

    • SHA512

      3e44ec1980dab1e2480e95e1af37a9e865140ce400445e90babdd884885a25f51c9732241fbf4396d84a1c9c253a94947fa38468ad1684e47ae6c511de496c28

    • SSDEEP

      3072:l7o+8bY15UT/8c4UhnRc6OAK4MdHU0qiRHJWrxpzbgqru2sxkgaBChH:CDE15UTk+cKK4MOUJuzbgwujiga

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks