General

  • Target

    JaffaCakes118_621af9ea3a44e4fab71237e384a0ca3808339d2d566a1b0144af74fe9d48bd02

  • Size

    220KB

  • Sample

    241229-nl85mszran

  • MD5

    5c43af858cebe82b1ad78c645061cc44

  • SHA1

    5babb64955d52797a58604a9aef14d689e90d35f

  • SHA256

    621af9ea3a44e4fab71237e384a0ca3808339d2d566a1b0144af74fe9d48bd02

  • SHA512

    2d2c7e9483b0b13dd8cabbbc5d1218fe0acdac78f1c676c8fc302e91c3d11cf44ea5f2c3ea53bbfa125e60769f1c99b0da9e27fc05c7f2a743116915aec39c60

  • SSDEEP

    3072:IUlCE+24yRwiP95GXu0bJ/rWrxpzbgqru+sxkgaBChmx/LI03qbN:ZV+Tybjijuzbgwu7igaQk

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_621af9ea3a44e4fab71237e384a0ca3808339d2d566a1b0144af74fe9d48bd02

    • Size

      220KB

    • MD5

      5c43af858cebe82b1ad78c645061cc44

    • SHA1

      5babb64955d52797a58604a9aef14d689e90d35f

    • SHA256

      621af9ea3a44e4fab71237e384a0ca3808339d2d566a1b0144af74fe9d48bd02

    • SHA512

      2d2c7e9483b0b13dd8cabbbc5d1218fe0acdac78f1c676c8fc302e91c3d11cf44ea5f2c3ea53bbfa125e60769f1c99b0da9e27fc05c7f2a743116915aec39c60

    • SSDEEP

      3072:IUlCE+24yRwiP95GXu0bJ/rWrxpzbgqru+sxkgaBChmx/LI03qbN:ZV+Tybjijuzbgwu7igaQk

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks