General

  • Target

    JaffaCakes118_f99276cbfae054d1eccc3ee442933687d8ebb7087b5005e7afbcdc34169b555a

  • Size

    187KB

  • Sample

    241225-wfmy8a1kdt

  • MD5

    768863f3b549af94613edd5eca8aea7a

  • SHA1

    b53463171e71cd65eef631c364a8304ff696cf94

  • SHA256

    f99276cbfae054d1eccc3ee442933687d8ebb7087b5005e7afbcdc34169b555a

  • SHA512

    30c7583f5ced5fafc90c65ba5362e293f7b1742bb01a9816618f12b5a22006404d77471e4e226650403bc5ed9fe78008b58dd03f02ad268c208e5c31b515d7f9

  • SSDEEP

    3072:CC7e/jDuFi2WidMDbeOaYgKbnTDC6RSfBVpZa9uD6Vdyhkk:CLLDuFi2WidMDbpaYsVVwVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_f99276cbfae054d1eccc3ee442933687d8ebb7087b5005e7afbcdc34169b555a

    • Size

      187KB

    • MD5

      768863f3b549af94613edd5eca8aea7a

    • SHA1

      b53463171e71cd65eef631c364a8304ff696cf94

    • SHA256

      f99276cbfae054d1eccc3ee442933687d8ebb7087b5005e7afbcdc34169b555a

    • SHA512

      30c7583f5ced5fafc90c65ba5362e293f7b1742bb01a9816618f12b5a22006404d77471e4e226650403bc5ed9fe78008b58dd03f02ad268c208e5c31b515d7f9

    • SSDEEP

      3072:CC7e/jDuFi2WidMDbeOaYgKbnTDC6RSfBVpZa9uD6Vdyhkk:CLLDuFi2WidMDbpaYsVVwVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks