General

  • Target

    JaffaCakes118_133f34fea559e89b1a51cf4a03365f50639d36d3330b26b8c3fe24a4105a6217

  • Size

    187KB

  • Sample

    241225-f6ht7aypew

  • MD5

    bbae7e6938c82707200c36080f772af5

  • SHA1

    44d0484b35f3e6c566124a8633d9486ba8e0e9c9

  • SHA256

    133f34fea559e89b1a51cf4a03365f50639d36d3330b26b8c3fe24a4105a6217

  • SHA512

    60c10e82b292a2785159ed1a1dce9660a92aa6ae02f1ebeea52aa1f349306a9466648fc2a39fef258c087d7d9e11de61ad67a6dd58adee7e2802d6d2bf8a5a57

  • SSDEEP

    3072:7b7FfjDuFi2Wi6cTO6OTD6Aem2nDQ62Hhg62IBTXFywNlLWdRpZa9uD6VdyhkO:79rDuFi2WiTO6GDonDQlHe62kysVWdRo

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_133f34fea559e89b1a51cf4a03365f50639d36d3330b26b8c3fe24a4105a6217

    • Size

      187KB

    • MD5

      bbae7e6938c82707200c36080f772af5

    • SHA1

      44d0484b35f3e6c566124a8633d9486ba8e0e9c9

    • SHA256

      133f34fea559e89b1a51cf4a03365f50639d36d3330b26b8c3fe24a4105a6217

    • SHA512

      60c10e82b292a2785159ed1a1dce9660a92aa6ae02f1ebeea52aa1f349306a9466648fc2a39fef258c087d7d9e11de61ad67a6dd58adee7e2802d6d2bf8a5a57

    • SSDEEP

      3072:7b7FfjDuFi2Wi6cTO6OTD6Aem2nDQ62Hhg62IBTXFywNlLWdRpZa9uD6VdyhkO:79rDuFi2WiTO6GDonDQlHe62kysVWdRo

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks