General

  • Target

    JaffaCakes118_c7afe2610ad94ccc44eae5c2251ffa81e94043fb2990325f47c8fe8f5cfdf6e4

  • Size

    165KB

  • Sample

    241228-3ahkwavlfx

  • MD5

    61d5927de2e87d20ed931c0477093c00

  • SHA1

    13576aee06b240532a623e54ada4349112ee70a3

  • SHA256

    c7afe2610ad94ccc44eae5c2251ffa81e94043fb2990325f47c8fe8f5cfdf6e4

  • SHA512

    9b721bd4a2ce6268c5239c8c7e1ffc8e3bc487d9de79451ba5b5a2744488d4867250e576f8a25260dd84b069419b4cdd2376f1d4433e4b127ee5f8eb0fd80e53

  • SSDEEP

    3072:8HecR8524A4opoavTqaeqUFM+7U7FA5jdDn4qko9K2D22y0u2:BcR024NlaTzUFM+7mArkgqe

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_c7afe2610ad94ccc44eae5c2251ffa81e94043fb2990325f47c8fe8f5cfdf6e4

    • Size

      165KB

    • MD5

      61d5927de2e87d20ed931c0477093c00

    • SHA1

      13576aee06b240532a623e54ada4349112ee70a3

    • SHA256

      c7afe2610ad94ccc44eae5c2251ffa81e94043fb2990325f47c8fe8f5cfdf6e4

    • SHA512

      9b721bd4a2ce6268c5239c8c7e1ffc8e3bc487d9de79451ba5b5a2744488d4867250e576f8a25260dd84b069419b4cdd2376f1d4433e4b127ee5f8eb0fd80e53

    • SSDEEP

      3072:8HecR8524A4opoavTqaeqUFM+7U7FA5jdDn4qko9K2D22y0u2:BcR024NlaTzUFM+7mArkgqe

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks