General

  • Target

    JaffaCakes118_86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385

  • Size

    285KB

  • Sample

    241229-n7zs4a1maw

  • MD5

    020b25befc4912d8e055a74e89795964

  • SHA1

    8b51f165c506a3c002345828a6fdf6458a20ad00

  • SHA256

    86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385

  • SHA512

    738ab2c84b1071de84983f896e26d6754cc052fec96580cc21af96fb2452d8f053a3d60cb4572f3208dee683031f58803c770e22901f467cee9b6b888bd3551d

  • SSDEEP

    6144:qBL5PZaxPmyPhDh8vICUCe02DuMY0Et6Hdz:GxaxPZh1iICUCe02HFEwHdz

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385

    • Size

      285KB

    • MD5

      020b25befc4912d8e055a74e89795964

    • SHA1

      8b51f165c506a3c002345828a6fdf6458a20ad00

    • SHA256

      86054a9f4dc9fc201137e9dabab67b47541cad795c5f9c307aebb95a74032385

    • SHA512

      738ab2c84b1071de84983f896e26d6754cc052fec96580cc21af96fb2452d8f053a3d60cb4572f3208dee683031f58803c770e22901f467cee9b6b888bd3551d

    • SSDEEP

      6144:qBL5PZaxPmyPhDh8vICUCe02DuMY0Et6Hdz:GxaxPZh1iICUCe02HFEwHdz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks