General

  • Target

    JaffaCakes118_802c09d2ca0066f5855f8e22a023510b405dbb26ea9d6daad5a66da992016f30

  • Size

    337KB

  • Sample

    241229-lv2qtayndp

  • MD5

    d5dcd6548c4e5b796fe37cf726284c44

  • SHA1

    bc323164c3dbbec11612920cdc1355d3a4cf78a9

  • SHA256

    802c09d2ca0066f5855f8e22a023510b405dbb26ea9d6daad5a66da992016f30

  • SHA512

    d0331d94a1199df34bfb75190494a3c1d80d2dfa37b80233c1a8308e3e58e3d89a7a26b317a98f44e0eb258c7751d8bfb68a68114cc35f99ae339fa8b9e87cc3

  • SSDEEP

    6144:+9SU8h6YplPuhSMpyXLeGpJhDRo/N6WHk2dUp:+IR1plXyyXLeG/FRY6WHk6Up

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_802c09d2ca0066f5855f8e22a023510b405dbb26ea9d6daad5a66da992016f30

    • Size

      337KB

    • MD5

      d5dcd6548c4e5b796fe37cf726284c44

    • SHA1

      bc323164c3dbbec11612920cdc1355d3a4cf78a9

    • SHA256

      802c09d2ca0066f5855f8e22a023510b405dbb26ea9d6daad5a66da992016f30

    • SHA512

      d0331d94a1199df34bfb75190494a3c1d80d2dfa37b80233c1a8308e3e58e3d89a7a26b317a98f44e0eb258c7751d8bfb68a68114cc35f99ae339fa8b9e87cc3

    • SSDEEP

      6144:+9SU8h6YplPuhSMpyXLeGpJhDRo/N6WHk2dUp:+IR1plXyyXLeG/FRY6WHk6Up

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks