General

  • Target

    JaffaCakes118_ea8c3f4261027d08ab8cce0cde9aab5c4a91b9e1dfbf05e9256ad1ca109346df

  • Size

    165KB

  • Sample

    241225-q3yfksvkem

  • MD5

    e3ff0997d4491087087113690455d779

  • SHA1

    0917d465cdb14b85472f8fe12814a6f42d605489

  • SHA256

    ea8c3f4261027d08ab8cce0cde9aab5c4a91b9e1dfbf05e9256ad1ca109346df

  • SHA512

    36231e81ed100a0557956f5164335545ac5c4bbfa922c9c2481a9f4e3f3f31a492203d808e1aab6183df952df9a1aaaf69427b585bb9695b7fe8dcc8c39ef780

  • SSDEEP

    3072:3jeAGOlqXQ7///rqPdKVvXckj8Dw1UfsF3uz04Vc2:KAG+qXosduvXcktAs9u/

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_ea8c3f4261027d08ab8cce0cde9aab5c4a91b9e1dfbf05e9256ad1ca109346df

    • Size

      165KB

    • MD5

      e3ff0997d4491087087113690455d779

    • SHA1

      0917d465cdb14b85472f8fe12814a6f42d605489

    • SHA256

      ea8c3f4261027d08ab8cce0cde9aab5c4a91b9e1dfbf05e9256ad1ca109346df

    • SHA512

      36231e81ed100a0557956f5164335545ac5c4bbfa922c9c2481a9f4e3f3f31a492203d808e1aab6183df952df9a1aaaf69427b585bb9695b7fe8dcc8c39ef780

    • SSDEEP

      3072:3jeAGOlqXQ7///rqPdKVvXckj8Dw1UfsF3uz04Vc2:KAG+qXosduvXcktAs9u/

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks