General

  • Target

    JaffaCakes118_a68572308ca7ad62169da59713041f697b10fdd7e9ecefbc137195bed35c38c7

  • Size

    296KB

  • Sample

    241229-dsj4zs1lcj

  • MD5

    bf7e2dcfd3c2efb008ef640d19b9b4f0

  • SHA1

    41cc58c97a3d8d0d6f831852446e6c75c3799444

  • SHA256

    a68572308ca7ad62169da59713041f697b10fdd7e9ecefbc137195bed35c38c7

  • SHA512

    bd4df049b00e62fa4b9dcdaa39d3217ad5c44becc80bb689c89fa4ed49d7a4f1270038b6e3b6719456be976e0dbf8eafaa739a20cd1e2fb4a4b7e9452c017fca

  • SSDEEP

    6144:6GZs4mCh2VtDSlgR7j1SaSXuZet0yy80uleoJTSjlZA8:lrhh2V9R75SaSXuZet0yy80uleFjlZ

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_a68572308ca7ad62169da59713041f697b10fdd7e9ecefbc137195bed35c38c7

    • Size

      296KB

    • MD5

      bf7e2dcfd3c2efb008ef640d19b9b4f0

    • SHA1

      41cc58c97a3d8d0d6f831852446e6c75c3799444

    • SHA256

      a68572308ca7ad62169da59713041f697b10fdd7e9ecefbc137195bed35c38c7

    • SHA512

      bd4df049b00e62fa4b9dcdaa39d3217ad5c44becc80bb689c89fa4ed49d7a4f1270038b6e3b6719456be976e0dbf8eafaa739a20cd1e2fb4a4b7e9452c017fca

    • SSDEEP

      6144:6GZs4mCh2VtDSlgR7j1SaSXuZet0yy80uleoJTSjlZA8:lrhh2V9R75SaSXuZet0yy80uleFjlZ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks