General

  • Target

    JaffaCakes118_4a8ff4292376fecbc3a78ec62f84db4cd27ed5f124af777837678c12edda5d80

  • Size

    188KB

  • Sample

    241229-rw9eyatmfy

  • MD5

    b8ae14ec90bf47e6f94d942c5718059b

  • SHA1

    fbc2ed4e74385f5e1763cd8fdf3db0b4cd607ae8

  • SHA256

    4a8ff4292376fecbc3a78ec62f84db4cd27ed5f124af777837678c12edda5d80

  • SHA512

    4d22ec962b2555ac2480ab9d78b4de369602ce2c6b5376a863782d8e0e85e419d67e8e30176ed0e01c76cc0656d1cfa38e3f7d0fd31d0803001e190c17c6ac1f

  • SSDEEP

    3072:97F4NKHBeCklmKGuJveyIh5cLcLLDjaqX+IzYZf6w6Eq:bACklmKTOaqZTssw

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_4a8ff4292376fecbc3a78ec62f84db4cd27ed5f124af777837678c12edda5d80

    • Size

      188KB

    • MD5

      b8ae14ec90bf47e6f94d942c5718059b

    • SHA1

      fbc2ed4e74385f5e1763cd8fdf3db0b4cd607ae8

    • SHA256

      4a8ff4292376fecbc3a78ec62f84db4cd27ed5f124af777837678c12edda5d80

    • SHA512

      4d22ec962b2555ac2480ab9d78b4de369602ce2c6b5376a863782d8e0e85e419d67e8e30176ed0e01c76cc0656d1cfa38e3f7d0fd31d0803001e190c17c6ac1f

    • SSDEEP

      3072:97F4NKHBeCklmKGuJveyIh5cLcLLDjaqX+IzYZf6w6Eq:bACklmKTOaqZTssw

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks