General

  • Target

    JaffaCakes118_c36d92eb67d8771a4fa4f2c7bd8c1b12d0ea8645fab45b3321000a9941e7304a

  • Size

    164KB

  • Sample

    241227-cn7h2syrg1

  • MD5

    d734569001b69222d805738edfc47168

  • SHA1

    f4879b2f7c66698f0debcc545836e8a6d63a7cec

  • SHA256

    c36d92eb67d8771a4fa4f2c7bd8c1b12d0ea8645fab45b3321000a9941e7304a

  • SHA512

    a78389a5b03ebed89ac85f2be37bcbcbfd03c02e5fe89e504ad4f9162162a1ad3080a8ff93ad1b94dafae525d18498c17cb2b7842ec533ae0676f4a16b2c0977

  • SSDEEP

    3072:mQOLRBnPGJFSBbG8PnQoa8kZwc46B4OqXXs4zyAPKYCUkO2:lOdBnPGSR/Qoa8pq8s4zysdCUkB

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_c36d92eb67d8771a4fa4f2c7bd8c1b12d0ea8645fab45b3321000a9941e7304a

    • Size

      164KB

    • MD5

      d734569001b69222d805738edfc47168

    • SHA1

      f4879b2f7c66698f0debcc545836e8a6d63a7cec

    • SHA256

      c36d92eb67d8771a4fa4f2c7bd8c1b12d0ea8645fab45b3321000a9941e7304a

    • SHA512

      a78389a5b03ebed89ac85f2be37bcbcbfd03c02e5fe89e504ad4f9162162a1ad3080a8ff93ad1b94dafae525d18498c17cb2b7842ec533ae0676f4a16b2c0977

    • SSDEEP

      3072:mQOLRBnPGJFSBbG8PnQoa8kZwc46B4OqXXs4zyAPKYCUkO2:lOdBnPGSR/Qoa8pq8s4zysdCUkB

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks