General

  • Target

    JaffaCakes118_e8cd082dad812bd35b097e5af74fe682a4f25b0a22d2aec37b76f5949c31f44b

  • Size

    185KB

  • Sample

    241230-bsvjlstjev

  • MD5

    d27b2ce9b4ed5d0a7451ef9e8d099aaf

  • SHA1

    bc45234704d9ee0b4c7aee62252bd3e2fc1f93ac

  • SHA256

    e8cd082dad812bd35b097e5af74fe682a4f25b0a22d2aec37b76f5949c31f44b

  • SHA512

    3845388ef1ef7afc26885461ec312247507195e8f8c5a4d918bb66bf90bc9bac774edb36ce93a9d9e01f05eb293e82681403f71050bdcd84effd55990224accd

  • SSDEEP

    3072:27nDIxHSknMqtvpOc/6isHRrIcSzAhHr1PFTGa7Q6uBbVggjcGkNIVqIF:0IxykNpOcivxrzVhHD707ITsq

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_e8cd082dad812bd35b097e5af74fe682a4f25b0a22d2aec37b76f5949c31f44b

    • Size

      185KB

    • MD5

      d27b2ce9b4ed5d0a7451ef9e8d099aaf

    • SHA1

      bc45234704d9ee0b4c7aee62252bd3e2fc1f93ac

    • SHA256

      e8cd082dad812bd35b097e5af74fe682a4f25b0a22d2aec37b76f5949c31f44b

    • SHA512

      3845388ef1ef7afc26885461ec312247507195e8f8c5a4d918bb66bf90bc9bac774edb36ce93a9d9e01f05eb293e82681403f71050bdcd84effd55990224accd

    • SSDEEP

      3072:27nDIxHSknMqtvpOc/6isHRrIcSzAhHr1PFTGa7Q6uBbVggjcGkNIVqIF:0IxykNpOcivxrzVhHD707ITsq

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks