General

  • Target

    JaffaCakes118_7eb1eb8b4e1456be837edf6d08e94bd7eb01c55b4dccbd36af5437e2ff0e18d5

  • Size

    157KB

  • Sample

    241230-g2ccaazrhp

  • MD5

    f4ee0f9e8df042e8b15e4a76f32f192c

  • SHA1

    febf45838fa43fbd92a8f70f4aa6a2474b109299

  • SHA256

    7eb1eb8b4e1456be837edf6d08e94bd7eb01c55b4dccbd36af5437e2ff0e18d5

  • SHA512

    8484b9fbf80954c88a84d171b164d5c5b6bf5aa73d89aaaf70d145266f9894d890dd133ffc931161d465dd61df239b7fd417b56e582cae79786fc67630eb31ea

  • SSDEEP

    1536:1IMFilYA4z/FeSs9UC34tWAvBnjraPnsWOw9ZCqLvg8fL30bw5A9jOYM6otnkEM:qSxItjItvwjOqCqLv138jWodRDvE

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_7eb1eb8b4e1456be837edf6d08e94bd7eb01c55b4dccbd36af5437e2ff0e18d5

    • Size

      157KB

    • MD5

      f4ee0f9e8df042e8b15e4a76f32f192c

    • SHA1

      febf45838fa43fbd92a8f70f4aa6a2474b109299

    • SHA256

      7eb1eb8b4e1456be837edf6d08e94bd7eb01c55b4dccbd36af5437e2ff0e18d5

    • SHA512

      8484b9fbf80954c88a84d171b164d5c5b6bf5aa73d89aaaf70d145266f9894d890dd133ffc931161d465dd61df239b7fd417b56e582cae79786fc67630eb31ea

    • SSDEEP

      1536:1IMFilYA4z/FeSs9UC34tWAvBnjraPnsWOw9ZCqLvg8fL30bw5A9jOYM6otnkEM:qSxItjItvwjOqCqLv138jWodRDvE

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks