General

  • Target

    JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61

  • Size

    173KB

  • Sample

    241229-3rwtts1jgs

  • MD5

    9f9ae6890b75d02bd12c641689feb0f3

  • SHA1

    b061f73eb4bffc740d14b8c60506e366ee6eb010

  • SHA256

    809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61

  • SHA512

    edc30a5fdebd31710f61aeddcffb47f98e51afa168ab0a31af1134c8942049bdb000cc1dd625dd11ff55621c7167789a27668a19dad76b07414765e6a3f6ba9a

  • SSDEEP

    3072:D7pw2Al1wUlCE0zZaGRRE2esjjc7XxxL33jai2:pHAl1wUcE0zZaGRRksAXxxL3T6

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61

    • Size

      173KB

    • MD5

      9f9ae6890b75d02bd12c641689feb0f3

    • SHA1

      b061f73eb4bffc740d14b8c60506e366ee6eb010

    • SHA256

      809a66221d8ddb4cca29184f243c786309bc929020ea0152c400068ffc738a61

    • SHA512

      edc30a5fdebd31710f61aeddcffb47f98e51afa168ab0a31af1134c8942049bdb000cc1dd625dd11ff55621c7167789a27668a19dad76b07414765e6a3f6ba9a

    • SSDEEP

      3072:D7pw2Al1wUlCE0zZaGRRE2esjjc7XxxL33jai2:pHAl1wUcE0zZaGRRksAXxxL3T6

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks