General

  • Target

    JaffaCakes118_be6c4755fa925ffa4250cf9e05a299ac9f146e892246f8843cc61ae29d59e529

  • Size

    337KB

  • Sample

    241226-zx1s7azphn

  • MD5

    691f941752cc0aeb2aa2c47b09940dd5

  • SHA1

    d94c0a393249605f798b9fcdc2fa91ac3993b20f

  • SHA256

    be6c4755fa925ffa4250cf9e05a299ac9f146e892246f8843cc61ae29d59e529

  • SHA512

    efe42c9a85b8fd32880fe8ace8e3680171c292d84c69dc2dfcab74fcda4fb02b96f41634ba138fd59b3ea6141bc8ba71dcc3ba6bbc032bb279c12f6bf8aae1e7

  • SSDEEP

    6144:v5+ign4C0SRg7rBxkxIQpZk/GfpyNTjS9OnFK5GEm9VHg5:0t3NRCrBa2QpZk/U0JS9OnFMm9

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_be6c4755fa925ffa4250cf9e05a299ac9f146e892246f8843cc61ae29d59e529

    • Size

      337KB

    • MD5

      691f941752cc0aeb2aa2c47b09940dd5

    • SHA1

      d94c0a393249605f798b9fcdc2fa91ac3993b20f

    • SHA256

      be6c4755fa925ffa4250cf9e05a299ac9f146e892246f8843cc61ae29d59e529

    • SHA512

      efe42c9a85b8fd32880fe8ace8e3680171c292d84c69dc2dfcab74fcda4fb02b96f41634ba138fd59b3ea6141bc8ba71dcc3ba6bbc032bb279c12f6bf8aae1e7

    • SSDEEP

      6144:v5+ign4C0SRg7rBxkxIQpZk/GfpyNTjS9OnFK5GEm9VHg5:0t3NRCrBa2QpZk/U0JS9OnFMm9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks