General

  • Target

    JaffaCakes118_67765735937e35b13119a8be553a6d9d29b742b19d040c29fca43766f1b651c5

  • Size

    288KB

  • Sample

    241225-vql91azkex

  • MD5

    fa140d14a8896282316dc78dbfcece18

  • SHA1

    65faf3fdf5ced2d784ed8d0453ac6468052b0f86

  • SHA256

    67765735937e35b13119a8be553a6d9d29b742b19d040c29fca43766f1b651c5

  • SHA512

    a32f7cb80a0219defee861b6c010351c9a590dde67cb7a4db99990013510dbf134f974c1671f8d6e8ec7bc31fd3fdc24eb09e836465b6d39faa51aad6430b65b

  • SSDEEP

    6144:ffO5YfmEAp6M/CPyIkmZ+uYuvEeZS5df:3O5Yf2fCPyIhZ+uUWSf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_67765735937e35b13119a8be553a6d9d29b742b19d040c29fca43766f1b651c5

    • Size

      288KB

    • MD5

      fa140d14a8896282316dc78dbfcece18

    • SHA1

      65faf3fdf5ced2d784ed8d0453ac6468052b0f86

    • SHA256

      67765735937e35b13119a8be553a6d9d29b742b19d040c29fca43766f1b651c5

    • SHA512

      a32f7cb80a0219defee861b6c010351c9a590dde67cb7a4db99990013510dbf134f974c1671f8d6e8ec7bc31fd3fdc24eb09e836465b6d39faa51aad6430b65b

    • SSDEEP

      6144:ffO5YfmEAp6M/CPyIkmZ+uYuvEeZS5df:3O5Yf2fCPyIhZ+uUWSf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks