General

  • Target

    JaffaCakes118_d6d6581e266a3f1d371dd4ddff0240e50b9aeee252373b15caad66eecacb873b

  • Size

    164KB

  • Sample

    241226-2whbkatpbs

  • MD5

    3b03a74a060d81bc5f249914436cf9b2

  • SHA1

    cdd3fa6edb335c7c6937ef85f3f2607a4ddaac71

  • SHA256

    d6d6581e266a3f1d371dd4ddff0240e50b9aeee252373b15caad66eecacb873b

  • SHA512

    f8c1da2d036b11ed887e18e3141e91376bb0d90d09b28423d944b079aabef85f8da49abcaec13c7017f95880eaedec834ada04f8bac59adeb8309a4042a10297

  • SSDEEP

    3072:1Grofl0FEH2fqwNhmS/PA7KlmrNQvBY8nsApTzkQwq2KlT3gc:EoflCEoqg8SwKlmr6JWMfkQ/TB

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      e1e65f9c773cc00d08dda0f9971fbb971c033d32382bdd1a59194adcde2c3e7e

    • Size

      337KB

    • MD5

      64765141b86d4bce1470e9b8b9de492d

    • SHA1

      8497035ee193ff0351f8ca6a5b924bf6db8f706d

    • SHA256

      e1e65f9c773cc00d08dda0f9971fbb971c033d32382bdd1a59194adcde2c3e7e

    • SHA512

      f8404a22092a659585eafa2f5504e630abe0302713e3ad13848f4809d92c39f284d85eb4db6c9cf9dc660ebe22b397e97b116cc196d698ab2ccdf1836b48507a

    • SSDEEP

      6144:xiu5EIbeIz5anwf7Beqh4QUslWmsos3xub+gQXcIjzqw:xuozSwf7Q2/UslWmkxK+gQXZl

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks