General

  • Target

    JaffaCakes118_cfa9a2895b49972fdffd76556471aadb3e056db1605e070c902013ec57cdfcac

  • Size

    165KB

  • Sample

    241229-3gpmrszqbz

  • MD5

    f0d2f02caedf76608c0e28ed847d3938

  • SHA1

    9a936ac3d1ea6fe5b7910c9e324aa1e20b0c5fbb

  • SHA256

    cfa9a2895b49972fdffd76556471aadb3e056db1605e070c902013ec57cdfcac

  • SHA512

    b7091d2c27d15e053c02c59182917da3a6b3d3d2d7ee6db7836cfd329f41ec27438d6c524fa3393622624407370674814fc518a003e58b577ac45b714b63f260

  • SSDEEP

    3072:JuerXeNjwKrCnQRYFGOFbNflNHfs2d4BnRoG2:VrXOjwWtr8bn9s2yC

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_cfa9a2895b49972fdffd76556471aadb3e056db1605e070c902013ec57cdfcac

    • Size

      165KB

    • MD5

      f0d2f02caedf76608c0e28ed847d3938

    • SHA1

      9a936ac3d1ea6fe5b7910c9e324aa1e20b0c5fbb

    • SHA256

      cfa9a2895b49972fdffd76556471aadb3e056db1605e070c902013ec57cdfcac

    • SHA512

      b7091d2c27d15e053c02c59182917da3a6b3d3d2d7ee6db7836cfd329f41ec27438d6c524fa3393622624407370674814fc518a003e58b577ac45b714b63f260

    • SSDEEP

      3072:JuerXeNjwKrCnQRYFGOFbNflNHfs2d4BnRoG2:VrXOjwWtr8bn9s2yC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks