General

  • Target

    JaffaCakes118_31a7b460acc977402548f8d7fbf33376ace8c82a0eca47a0b0d69433c1a4ba62

  • Size

    187KB

  • Sample

    241229-am1m1awnby

  • MD5

    e51f2c8d6cf01eb1334b595012f4458a

  • SHA1

    29750148c250ac59edd7015d8136c01cc030ea96

  • SHA256

    31a7b460acc977402548f8d7fbf33376ace8c82a0eca47a0b0d69433c1a4ba62

  • SHA512

    76a801b9a9630c89e5e869787f83f1a8c6e2e897b72cb20469eefd0900a16426a67316e44da01fa60d50d360ed03d34d22884f3570f178dc8e302227d6526805

  • SSDEEP

    3072:57ojA4DTPi9x53DbgRCm/m2+XhcrJ2l3c3LZIpZa9uD6Vdyhk9:YA4DTPil3Dq/d+Rc8c36wVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_31a7b460acc977402548f8d7fbf33376ace8c82a0eca47a0b0d69433c1a4ba62

    • Size

      187KB

    • MD5

      e51f2c8d6cf01eb1334b595012f4458a

    • SHA1

      29750148c250ac59edd7015d8136c01cc030ea96

    • SHA256

      31a7b460acc977402548f8d7fbf33376ace8c82a0eca47a0b0d69433c1a4ba62

    • SHA512

      76a801b9a9630c89e5e869787f83f1a8c6e2e897b72cb20469eefd0900a16426a67316e44da01fa60d50d360ed03d34d22884f3570f178dc8e302227d6526805

    • SSDEEP

      3072:57ojA4DTPi9x53DbgRCm/m2+XhcrJ2l3c3LZIpZa9uD6Vdyhk9:YA4DTPil3Dq/d+Rc8c36wVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks