General

  • Target

    JaffaCakes118_e062e099f7f60e5d9691feeba382b35462333681617fcd28b01d979af3cac0da

  • Size

    179KB

  • Sample

    241225-fdyd6sykdy

  • MD5

    a87dea05702e243412ac9b970fb39a1c

  • SHA1

    941366aa542c77c5b5ef4d4efe863ba3fec2d72f

  • SHA256

    e062e099f7f60e5d9691feeba382b35462333681617fcd28b01d979af3cac0da

  • SHA512

    184d13163c8cdfcc2008cd518e350016d6976530412c0bd4d346426c08b19d1c48630ed26f718208047cc90462055c07919f1be3d725412b97673e093a9ee52c

  • SSDEEP

    3072:Y7w4SLqj70RIT1KorqzMWrj7KxClkp7lHDs9Z2D21jl1:9qj7O60oG7KkypG9Z2D21

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_e062e099f7f60e5d9691feeba382b35462333681617fcd28b01d979af3cac0da

    • Size

      179KB

    • MD5

      a87dea05702e243412ac9b970fb39a1c

    • SHA1

      941366aa542c77c5b5ef4d4efe863ba3fec2d72f

    • SHA256

      e062e099f7f60e5d9691feeba382b35462333681617fcd28b01d979af3cac0da

    • SHA512

      184d13163c8cdfcc2008cd518e350016d6976530412c0bd4d346426c08b19d1c48630ed26f718208047cc90462055c07919f1be3d725412b97673e093a9ee52c

    • SSDEEP

      3072:Y7w4SLqj70RIT1KorqzMWrj7KxClkp7lHDs9Z2D21jl1:9qj7O60oG7KkypG9Z2D21

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks