General

  • Target

    JaffaCakes118_0c8460275bff2dbb557dc58ed9ff3d05ec581e9c5f7b8033c7d1d2fa07eca735

  • Size

    292KB

  • Sample

    241229-14by3sykbw

  • MD5

    14936120ec4dd7c433d5af318a2ef8a6

  • SHA1

    a177abb559dc1d6d4e7ddc248c8214aae17d4c8c

  • SHA256

    0c8460275bff2dbb557dc58ed9ff3d05ec581e9c5f7b8033c7d1d2fa07eca735

  • SHA512

    0de81ca627fcbe7d6f6934c313ae8891db862c45807cc9752a0d768d1637f6351414814f6cedf0328f6c120608984f399add1fa068a9b53ea18ee5d94328e7b5

  • SSDEEP

    6144:yh9vzdC7naJt5JfbrSXuZet0yobwPN2VEyLvo:2zI7Gt55fSXuZet0yobwgEyk

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_0c8460275bff2dbb557dc58ed9ff3d05ec581e9c5f7b8033c7d1d2fa07eca735

    • Size

      292KB

    • MD5

      14936120ec4dd7c433d5af318a2ef8a6

    • SHA1

      a177abb559dc1d6d4e7ddc248c8214aae17d4c8c

    • SHA256

      0c8460275bff2dbb557dc58ed9ff3d05ec581e9c5f7b8033c7d1d2fa07eca735

    • SHA512

      0de81ca627fcbe7d6f6934c313ae8891db862c45807cc9752a0d768d1637f6351414814f6cedf0328f6c120608984f399add1fa068a9b53ea18ee5d94328e7b5

    • SSDEEP

      6144:yh9vzdC7naJt5JfbrSXuZet0yobwPN2VEyLvo:2zI7Gt55fSXuZet0yobwgEyk

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks