General

  • Target

    JaffaCakes118_0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95

  • Size

    319KB

  • Sample

    241225-plrq2asqfm

  • MD5

    3fec5b2cd8ad9cf5e402e5917d0a2d28

  • SHA1

    e7bb71e2a451c80dea5d8817ce2baf57d431d967

  • SHA256

    0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95

  • SHA512

    6983581c36a46842292a90ab6499beb484d6c0933ca0f87f68bc3859a2f47b6210bbbf69365eafbf2cc74430fa656957aeb977838b5461a2376c53df7f564cb9

  • SSDEEP

    6144:DMh8SvMvFv8Ibbn71octhHlOZU5PtV7WexP2:wh8SvMRbLpocthHlF5Pj7z2

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95

    • Size

      319KB

    • MD5

      3fec5b2cd8ad9cf5e402e5917d0a2d28

    • SHA1

      e7bb71e2a451c80dea5d8817ce2baf57d431d967

    • SHA256

      0ad8dc80eef06a5cedcbcec0871e8aa976fd870b814fc80c1534c6e9fd378b95

    • SHA512

      6983581c36a46842292a90ab6499beb484d6c0933ca0f87f68bc3859a2f47b6210bbbf69365eafbf2cc74430fa656957aeb977838b5461a2376c53df7f564cb9

    • SSDEEP

      6144:DMh8SvMvFv8Ibbn71octhHlOZU5PtV7WexP2:wh8SvMRbLpocthHlF5Pj7z2

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks