General

  • Target

    JaffaCakes118_4ffa17dc5c1c0998ba93f9a2576071ad345b857865691bfa4f11d6d80a5f4d23

  • Size

    187KB

  • Sample

    241225-w5nxtasjgw

  • MD5

    c2a778630a2fc539bb9513aea545263d

  • SHA1

    922e32d1aec7cb7bde493f5cb83514478a714cd3

  • SHA256

    4ffa17dc5c1c0998ba93f9a2576071ad345b857865691bfa4f11d6d80a5f4d23

  • SHA512

    e0b291ab6b976e4a7e44d221c058edbd4861135865e56e54f6c98437fbf1aa095eda70fbcdc40b72951b119285f225ecd8f11a47ba1814bc7472f1a7379c9cfb

  • SSDEEP

    3072:y7nkTvI0pZG/xfCqaSvAt7XLh27C+Eo3Ey0slcok9pZa9uD6Vdyhkf:S+vI0pZG/xfCqBA92OGcok9wVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_4ffa17dc5c1c0998ba93f9a2576071ad345b857865691bfa4f11d6d80a5f4d23

    • Size

      187KB

    • MD5

      c2a778630a2fc539bb9513aea545263d

    • SHA1

      922e32d1aec7cb7bde493f5cb83514478a714cd3

    • SHA256

      4ffa17dc5c1c0998ba93f9a2576071ad345b857865691bfa4f11d6d80a5f4d23

    • SHA512

      e0b291ab6b976e4a7e44d221c058edbd4861135865e56e54f6c98437fbf1aa095eda70fbcdc40b72951b119285f225ecd8f11a47ba1814bc7472f1a7379c9cfb

    • SSDEEP

      3072:y7nkTvI0pZG/xfCqaSvAt7XLh27C+Eo3Ey0slcok9pZa9uD6Vdyhkf:S+vI0pZG/xfCqBA92OGcok9wVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks