General

  • Target

    JaffaCakes118_3cea5df8eaee36dc9a9b0fc5eaf6b36bc98c4fa4df58f0e4b4f12417e57fa448

  • Size

    246KB

  • Sample

    241229-nv7cea1jgr

  • MD5

    ece784cccb962922fc1854433038c4cf

  • SHA1

    3484e8fa539bac64f269584cc0f368cc7af89ee2

  • SHA256

    3cea5df8eaee36dc9a9b0fc5eaf6b36bc98c4fa4df58f0e4b4f12417e57fa448

  • SHA512

    a594719d1ff40e4186f32a5a3d5955fe565bda2fbac6970bbcf4221939bf76ee064a4f36acf2fb1ff848028f2498b57f07cc0b691a797d7789eccf6e47a7e682

  • SSDEEP

    6144:m2xmEmR0kLmK7vk1puzbgwu6QigabwVf:m0mEmR0ZKz8unn5

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_3cea5df8eaee36dc9a9b0fc5eaf6b36bc98c4fa4df58f0e4b4f12417e57fa448

    • Size

      246KB

    • MD5

      ece784cccb962922fc1854433038c4cf

    • SHA1

      3484e8fa539bac64f269584cc0f368cc7af89ee2

    • SHA256

      3cea5df8eaee36dc9a9b0fc5eaf6b36bc98c4fa4df58f0e4b4f12417e57fa448

    • SHA512

      a594719d1ff40e4186f32a5a3d5955fe565bda2fbac6970bbcf4221939bf76ee064a4f36acf2fb1ff848028f2498b57f07cc0b691a797d7789eccf6e47a7e682

    • SSDEEP

      6144:m2xmEmR0kLmK7vk1puzbgwu6QigabwVf:m0mEmR0ZKz8unn5

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks