General

  • Target

    JaffaCakes118_bc73ac7b6af032e502c4ffa71acedacd1062679ff9f6d35ca046eb8f4b0e43a9

  • Size

    292KB

  • Sample

    241227-c2lhqsznbn

  • MD5

    be4db488e1175f94ff48a099dbfec832

  • SHA1

    c6ea22eb8dbeb906635048ef4fe1157dc0c96365

  • SHA256

    bc73ac7b6af032e502c4ffa71acedacd1062679ff9f6d35ca046eb8f4b0e43a9

  • SHA512

    424bf39eae62856db8e57712a1616d2dba4474aa062f8da48b7ab63b419abae4120b657db356d31cedca2afd2e061ce780f52d5b9598349934cf9d0ad0295787

  • SSDEEP

    6144:Xe91EWAEf6zdvBIWYu+0frSXuZet0yobvPtxkmzmQJ/G:u913izdBYujDSXuZet0yobvrfzm

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_bc73ac7b6af032e502c4ffa71acedacd1062679ff9f6d35ca046eb8f4b0e43a9

    • Size

      292KB

    • MD5

      be4db488e1175f94ff48a099dbfec832

    • SHA1

      c6ea22eb8dbeb906635048ef4fe1157dc0c96365

    • SHA256

      bc73ac7b6af032e502c4ffa71acedacd1062679ff9f6d35ca046eb8f4b0e43a9

    • SHA512

      424bf39eae62856db8e57712a1616d2dba4474aa062f8da48b7ab63b419abae4120b657db356d31cedca2afd2e061ce780f52d5b9598349934cf9d0ad0295787

    • SSDEEP

      6144:Xe91EWAEf6zdvBIWYu+0frSXuZet0yobvPtxkmzmQJ/G:u913izdBYujDSXuZet0yobvrfzm

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks