General

  • Target

    JaffaCakes118_d64403ee58f2ea101e484cfc729f8a6b257f6d878407a59c4ff30f22f9341e27

  • Size

    186KB

  • Sample

    241228-2q9hvsvjdn

  • MD5

    64c68256f7f207094671f6f01fd3dfc7

  • SHA1

    6e0be13a130b4fba1dcc3fcc820d94f822689464

  • SHA256

    d64403ee58f2ea101e484cfc729f8a6b257f6d878407a59c4ff30f22f9341e27

  • SHA512

    2c755bb99e0d4a995f78d1b8fd52784246a43fbc7c1bcc08a4273e39ae749d58436cb0e3a83e73b007ca86b76edd450207f97fcdf53dc974646c68c02fe0b8fe

  • SSDEEP

    3072:Y7c4r7YqcnhiR+tHVPc275lz+rBqX9eGwPNSa9e92czp:gcqchiRiPcuh+rE9etPQa9w2ct

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_d64403ee58f2ea101e484cfc729f8a6b257f6d878407a59c4ff30f22f9341e27

    • Size

      186KB

    • MD5

      64c68256f7f207094671f6f01fd3dfc7

    • SHA1

      6e0be13a130b4fba1dcc3fcc820d94f822689464

    • SHA256

      d64403ee58f2ea101e484cfc729f8a6b257f6d878407a59c4ff30f22f9341e27

    • SHA512

      2c755bb99e0d4a995f78d1b8fd52784246a43fbc7c1bcc08a4273e39ae749d58436cb0e3a83e73b007ca86b76edd450207f97fcdf53dc974646c68c02fe0b8fe

    • SSDEEP

      3072:Y7c4r7YqcnhiR+tHVPc275lz+rBqX9eGwPNSa9e92czp:gcqchiRiPcuh+rE9etPQa9w2ct

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks