General

  • Target

    JaffaCakes118_499d65ae848034b47448e62a1f54b52a7f5210836e009ef02f44a7ede4a46edd

  • Size

    285KB

  • Sample

    241229-f4ae2atnar

  • MD5

    c7c81a19e0a0682869c98da734e55b25

  • SHA1

    d2e58799c4814e11beb7bf23b594ddfdb654bbfe

  • SHA256

    499d65ae848034b47448e62a1f54b52a7f5210836e009ef02f44a7ede4a46edd

  • SHA512

    7e9059ce89b52ec5fc16c75fc3db559751ad29f288452228670068db3063628e8828e06bebc3ed3d6ad5ce43400a7f4a50294aa535b5064d6b8acd1612ec2d13

  • SSDEEP

    6144:QKFbjoZovivz4hNuzbgwu6L7ITsqSigaTwVf:DbjoZMlhNunnn7s

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_499d65ae848034b47448e62a1f54b52a7f5210836e009ef02f44a7ede4a46edd

    • Size

      285KB

    • MD5

      c7c81a19e0a0682869c98da734e55b25

    • SHA1

      d2e58799c4814e11beb7bf23b594ddfdb654bbfe

    • SHA256

      499d65ae848034b47448e62a1f54b52a7f5210836e009ef02f44a7ede4a46edd

    • SHA512

      7e9059ce89b52ec5fc16c75fc3db559751ad29f288452228670068db3063628e8828e06bebc3ed3d6ad5ce43400a7f4a50294aa535b5064d6b8acd1612ec2d13

    • SSDEEP

      6144:QKFbjoZovivz4hNuzbgwu6L7ITsqSigaTwVf:DbjoZMlhNunnn7s

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks