General

  • Target

    JaffaCakes118_f62db2d3722f8e72269ffa71d176a9bc7d73d181a2b8196e562ce21f2cbf8b7c

  • Size

    159KB

  • Sample

    241230-czfjpsvmdt

  • MD5

    e99963dcc190612b5e494ede0de3f4a8

  • SHA1

    420c50f90d40a751b519b32884c01a0966554177

  • SHA256

    f62db2d3722f8e72269ffa71d176a9bc7d73d181a2b8196e562ce21f2cbf8b7c

  • SHA512

    0f0d6788d7e0ba7224bb98f19c3dd11b88d9fb151a6a04a457f41b5f943d8e177ccc603a05ddd5af5bf0e9e26ee389b74431e31c464acb2d344b2595e92a3d37

  • SSDEEP

    3072:g+7ItK82vZxiNi/yKGcCXNybw3kv+CFhyF9:ga82vZxiNiqKlCdynK

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_f62db2d3722f8e72269ffa71d176a9bc7d73d181a2b8196e562ce21f2cbf8b7c

    • Size

      159KB

    • MD5

      e99963dcc190612b5e494ede0de3f4a8

    • SHA1

      420c50f90d40a751b519b32884c01a0966554177

    • SHA256

      f62db2d3722f8e72269ffa71d176a9bc7d73d181a2b8196e562ce21f2cbf8b7c

    • SHA512

      0f0d6788d7e0ba7224bb98f19c3dd11b88d9fb151a6a04a457f41b5f943d8e177ccc603a05ddd5af5bf0e9e26ee389b74431e31c464acb2d344b2595e92a3d37

    • SSDEEP

      3072:g+7ItK82vZxiNi/yKGcCXNybw3kv+CFhyF9:ga82vZxiNiqKlCdynK

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks