General

  • Target

    JaffaCakes118_fda6b81845b74210279a7797739ba4deddebf04f6b1b9a7dff4a38a793808e1f

  • Size

    160KB

  • Sample

    241225-yqjqnavqax

  • MD5

    f7362c11138f5fb89143d4e97419b015

  • SHA1

    f67454310411f4d89d34699b5faa8f5643806de6

  • SHA256

    fda6b81845b74210279a7797739ba4deddebf04f6b1b9a7dff4a38a793808e1f

  • SHA512

    c242fb26590cae181260ab8d8c786f69821d4131478c1d8a08beca116db329080eb28020b8636bc70907ced218913f802ec32e6621e349ebe13a596c090b6c12

  • SSDEEP

    1536:9aCl+iglHErWOeaAnDt45cNQ6nVGAk/m1AR8bFgrTTN2FJpstlLnDe06IO4gGGH5:IFqSV7W5vnw7JSTrMIWQLDP9KmMFTe0

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_fda6b81845b74210279a7797739ba4deddebf04f6b1b9a7dff4a38a793808e1f

    • Size

      160KB

    • MD5

      f7362c11138f5fb89143d4e97419b015

    • SHA1

      f67454310411f4d89d34699b5faa8f5643806de6

    • SHA256

      fda6b81845b74210279a7797739ba4deddebf04f6b1b9a7dff4a38a793808e1f

    • SHA512

      c242fb26590cae181260ab8d8c786f69821d4131478c1d8a08beca116db329080eb28020b8636bc70907ced218913f802ec32e6621e349ebe13a596c090b6c12

    • SSDEEP

      1536:9aCl+iglHErWOeaAnDt45cNQ6nVGAk/m1AR8bFgrTTN2FJpstlLnDe06IO4gGGH5:IFqSV7W5vnw7JSTrMIWQLDP9KmMFTe0

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks