General

  • Target

    JaffaCakes118_edf91adac029089d20ecaa12dfaf37aa6f30048fc11dbc94ab22c2fe16eaf72a

  • Size

    234KB

  • Sample

    241226-tm8hdsznaw

  • MD5

    23c4dddcbb1118afe8e89be556182646

  • SHA1

    fbda92dcf9cabd1f106d6315a064756cd7bd8494

  • SHA256

    edf91adac029089d20ecaa12dfaf37aa6f30048fc11dbc94ab22c2fe16eaf72a

  • SHA512

    06cd65c7a3d8b4cf63d9898c578a5527dd96222669789e3973d17b3446a4c6bdf0af5ef7a28d8ea6de10fc4e8923542bfbabad481c9490de291b930f97c384be

  • SSDEEP

    6144:eZRil6yHn3xm61E1jhPUn6CHuzbgwujigaLwVf:eZRioyH3xm6+Cn6CHunnb

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_edf91adac029089d20ecaa12dfaf37aa6f30048fc11dbc94ab22c2fe16eaf72a

    • Size

      234KB

    • MD5

      23c4dddcbb1118afe8e89be556182646

    • SHA1

      fbda92dcf9cabd1f106d6315a064756cd7bd8494

    • SHA256

      edf91adac029089d20ecaa12dfaf37aa6f30048fc11dbc94ab22c2fe16eaf72a

    • SHA512

      06cd65c7a3d8b4cf63d9898c578a5527dd96222669789e3973d17b3446a4c6bdf0af5ef7a28d8ea6de10fc4e8923542bfbabad481c9490de291b930f97c384be

    • SSDEEP

      6144:eZRil6yHn3xm61E1jhPUn6CHuzbgwujigaLwVf:eZRioyH3xm6+Cn6CHunnb

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks