General

  • Target

    JaffaCakes118_ee5aa1555ccc472a4d5e8e6f34d9b527cd87db85f7c6c2f37148cf3ea422870a

  • Size

    291KB

  • Sample

    241229-ff4zqstjak

  • MD5

    75e6c2aff85d117e67665bbdb65135c2

  • SHA1

    18a7e734c143851fe75be433ed801e0f723a069e

  • SHA256

    ee5aa1555ccc472a4d5e8e6f34d9b527cd87db85f7c6c2f37148cf3ea422870a

  • SHA512

    5c4966f063af976a7c844b1c161bca833737d2ef8bf5608e899ef774652f92e922097dda0a5713e37b8be37cf6b0ca238117c99b8e37fecab1bd6f2a91472ab4

  • SSDEEP

    3072:f3fyrBNQ0SXhndx/y8rpdb0Pecqb04kFr+D7VYg0lg/y+3+N1LnBmFMRzGNtn7ff:vqQPFhxcqb044r65YZS7+vBs0w1CeoG

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_ee5aa1555ccc472a4d5e8e6f34d9b527cd87db85f7c6c2f37148cf3ea422870a

    • Size

      291KB

    • MD5

      75e6c2aff85d117e67665bbdb65135c2

    • SHA1

      18a7e734c143851fe75be433ed801e0f723a069e

    • SHA256

      ee5aa1555ccc472a4d5e8e6f34d9b527cd87db85f7c6c2f37148cf3ea422870a

    • SHA512

      5c4966f063af976a7c844b1c161bca833737d2ef8bf5608e899ef774652f92e922097dda0a5713e37b8be37cf6b0ca238117c99b8e37fecab1bd6f2a91472ab4

    • SSDEEP

      3072:f3fyrBNQ0SXhndx/y8rpdb0Pecqb04kFr+D7VYg0lg/y+3+N1LnBmFMRzGNtn7ff:vqQPFhxcqb044r65YZS7+vBs0w1CeoG

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks