General

  • Target

    JaffaCakes118_c93db7852cefef285a014a3273d9769ded1f77326b410e90bec25228c243a339

  • Size

    291KB

  • Sample

    241225-hlvdla1jek

  • MD5

    a9b53db0d8fa7e204383d8bb1ea6d8e9

  • SHA1

    38598c9ea697fe0d3f1f4b75c366ea96b533f44a

  • SHA256

    c93db7852cefef285a014a3273d9769ded1f77326b410e90bec25228c243a339

  • SHA512

    355a1350ca0a097dbcf95b5ab87e5eef69df1e9b491b7d48de0d6ff0c1c3277f94940d06c62a0c67e19110c4d67002800bda85005e48b07de44cb3712ad2ef53

  • SSDEEP

    6144:v1Qkl7WtXbo6dYV04w7Y3YNM9bAkPXWANLd:vCkl7W7dOJw7Y3YNM9bAbELd

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_c93db7852cefef285a014a3273d9769ded1f77326b410e90bec25228c243a339

    • Size

      291KB

    • MD5

      a9b53db0d8fa7e204383d8bb1ea6d8e9

    • SHA1

      38598c9ea697fe0d3f1f4b75c366ea96b533f44a

    • SHA256

      c93db7852cefef285a014a3273d9769ded1f77326b410e90bec25228c243a339

    • SHA512

      355a1350ca0a097dbcf95b5ab87e5eef69df1e9b491b7d48de0d6ff0c1c3277f94940d06c62a0c67e19110c4d67002800bda85005e48b07de44cb3712ad2ef53

    • SSDEEP

      6144:v1Qkl7WtXbo6dYV04w7Y3YNM9bAkPXWANLd:vCkl7W7dOJw7Y3YNM9bAbELd

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks