General

  • Target

    JaffaCakes118_711f92fa9ac41fc35df5af56e8b669cc59ab52e52e60d2458b303d258bac29ae

  • Size

    328KB

  • Sample

    241225-qjqavstnbv

  • MD5

    0011b607f6708b1c582cfd6775142bc1

  • SHA1

    96fbcf5c5316e23f258513c1dd4486e0cb9aca5d

  • SHA256

    711f92fa9ac41fc35df5af56e8b669cc59ab52e52e60d2458b303d258bac29ae

  • SHA512

    0afead70fa35124ca60f71961df077948bcead68ab101042934695726cffe5bdd85fd3a4493f953496747a17f6635aa956a22ac9452f49e772599303e2e2214d

  • SSDEEP

    6144:os0VP7IpmXLkbvHlO3x1lDKIFkoZLlSpArU:ofbWvQ3x1ltFdZE

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_711f92fa9ac41fc35df5af56e8b669cc59ab52e52e60d2458b303d258bac29ae

    • Size

      328KB

    • MD5

      0011b607f6708b1c582cfd6775142bc1

    • SHA1

      96fbcf5c5316e23f258513c1dd4486e0cb9aca5d

    • SHA256

      711f92fa9ac41fc35df5af56e8b669cc59ab52e52e60d2458b303d258bac29ae

    • SHA512

      0afead70fa35124ca60f71961df077948bcead68ab101042934695726cffe5bdd85fd3a4493f953496747a17f6635aa956a22ac9452f49e772599303e2e2214d

    • SSDEEP

      6144:os0VP7IpmXLkbvHlO3x1lDKIFkoZLlSpArU:ofbWvQ3x1ltFdZE

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks