General

  • Target

    JaffaCakes118_5411354e943b9ac88a828a6769497307dd7bf67954c878eef8027f34afe0443b

  • Size

    238KB

  • Sample

    241228-2pz8sstpa1

  • MD5

    7b1c6a6a156ceda7be1606583bc126a5

  • SHA1

    466c9e967bcf87509615e0dd98f2c007ee886fa4

  • SHA256

    5411354e943b9ac88a828a6769497307dd7bf67954c878eef8027f34afe0443b

  • SHA512

    f13f2ff68613cf952492f7b1c561fe27d9f8ebaacd863930c2b0ab235900c5280abdcdbce4348e4e2c96de055d7532e69a94712e0e7fbcc7885a34ab1f1cf5da

  • SSDEEP

    3072:v7ojA4DTPiryxGZEftEZp2I3/qQW7NbVggjcGkNIVqI7sxkgaBChMpZa9uD6VdyV:aA4DTPirDWlEV/cf7ITsq7igavwVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_5411354e943b9ac88a828a6769497307dd7bf67954c878eef8027f34afe0443b

    • Size

      238KB

    • MD5

      7b1c6a6a156ceda7be1606583bc126a5

    • SHA1

      466c9e967bcf87509615e0dd98f2c007ee886fa4

    • SHA256

      5411354e943b9ac88a828a6769497307dd7bf67954c878eef8027f34afe0443b

    • SHA512

      f13f2ff68613cf952492f7b1c561fe27d9f8ebaacd863930c2b0ab235900c5280abdcdbce4348e4e2c96de055d7532e69a94712e0e7fbcc7885a34ab1f1cf5da

    • SSDEEP

      3072:v7ojA4DTPiryxGZEftEZp2I3/qQW7NbVggjcGkNIVqI7sxkgaBChMpZa9uD6VdyV:aA4DTPirDWlEV/cf7ITsq7igavwVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks