General

  • Target

    JaffaCakes118_81adb918945e7db12db84a7cbbc85c08f8d43fcc933bfbfe8f7715a6de900618

  • Size

    254KB

  • Sample

    241229-n2zk5s1la1

  • MD5

    74629d3db7f637e0f797ffe848292c52

  • SHA1

    661a8a084530e9bffb3c864d0a303a525af2ba23

  • SHA256

    81adb918945e7db12db84a7cbbc85c08f8d43fcc933bfbfe8f7715a6de900618

  • SHA512

    c25e786fc5902f38ade2d60d06517f9d0e32004065b19d8be9ded5577019d9e48449e8832f3d7a37547096b4c7c18ae9a4e6d37701f1bece314dfdb8b3515fee

  • SSDEEP

    6144:Fu5D3sXRTvOeg0Fdi/DOSchxOtGPoGial4zQ:c9Indi/DOHiGPqP

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_81adb918945e7db12db84a7cbbc85c08f8d43fcc933bfbfe8f7715a6de900618

    • Size

      254KB

    • MD5

      74629d3db7f637e0f797ffe848292c52

    • SHA1

      661a8a084530e9bffb3c864d0a303a525af2ba23

    • SHA256

      81adb918945e7db12db84a7cbbc85c08f8d43fcc933bfbfe8f7715a6de900618

    • SHA512

      c25e786fc5902f38ade2d60d06517f9d0e32004065b19d8be9ded5577019d9e48449e8832f3d7a37547096b4c7c18ae9a4e6d37701f1bece314dfdb8b3515fee

    • SSDEEP

      6144:Fu5D3sXRTvOeg0Fdi/DOSchxOtGPoGial4zQ:c9Indi/DOHiGPqP

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks