General

  • Target

    JaffaCakes118_7d864dab15342d8bc85fcaa9bb271ab6667942fe36dcc6dc10531ac1f7a10393

  • Size

    157KB

  • Sample

    241229-mj3z6szjbv

  • MD5

    3d201b74a8262f54a9e1b4deb21ceb27

  • SHA1

    98373771bf76faa60818e232002f1aa173299476

  • SHA256

    7d864dab15342d8bc85fcaa9bb271ab6667942fe36dcc6dc10531ac1f7a10393

  • SHA512

    9017ac359dcde22358624585d040455b83bd147620b9666365c79cb386fdf35268f4804dbcb2d438567b5d1d24d97ed828709b4ab39efbf6e6e26bf3349563b2

  • SSDEEP

    3072:+RBIdzINvPe8bO+xsCb0xo8oyHkksDlYHQB:SIGVmh+xh01h9H

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_7d864dab15342d8bc85fcaa9bb271ab6667942fe36dcc6dc10531ac1f7a10393

    • Size

      157KB

    • MD5

      3d201b74a8262f54a9e1b4deb21ceb27

    • SHA1

      98373771bf76faa60818e232002f1aa173299476

    • SHA256

      7d864dab15342d8bc85fcaa9bb271ab6667942fe36dcc6dc10531ac1f7a10393

    • SHA512

      9017ac359dcde22358624585d040455b83bd147620b9666365c79cb386fdf35268f4804dbcb2d438567b5d1d24d97ed828709b4ab39efbf6e6e26bf3349563b2

    • SSDEEP

      3072:+RBIdzINvPe8bO+xsCb0xo8oyHkksDlYHQB:SIGVmh+xh01h9H

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks