General

  • Target

    JaffaCakes118_467c2fcd367c964c7d347a86b12f431d5178760336360d82d02492fb4e189fb4

  • Size

    169KB

  • Sample

    241230-gab77szmcq

  • MD5

    0f8e3d40f63140e6d94672c2398cedb6

  • SHA1

    0ee161a2e25b21bed17edca096836bb874a0135f

  • SHA256

    467c2fcd367c964c7d347a86b12f431d5178760336360d82d02492fb4e189fb4

  • SHA512

    11c85084d3c0db1a9b4fa2b83826c313ac5d4ca1ea3f2253a49a100a9a135f5ffdbfca6c5b88ec898d1001bd78b450e2dbc5d82876c8848593981d2051d6d10b

  • SSDEEP

    3072:ePmXKeALDeYAJoHMWR2Oceh7XVmQdrUJY:NKe4eYHRWApnU

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_467c2fcd367c964c7d347a86b12f431d5178760336360d82d02492fb4e189fb4

    • Size

      169KB

    • MD5

      0f8e3d40f63140e6d94672c2398cedb6

    • SHA1

      0ee161a2e25b21bed17edca096836bb874a0135f

    • SHA256

      467c2fcd367c964c7d347a86b12f431d5178760336360d82d02492fb4e189fb4

    • SHA512

      11c85084d3c0db1a9b4fa2b83826c313ac5d4ca1ea3f2253a49a100a9a135f5ffdbfca6c5b88ec898d1001bd78b450e2dbc5d82876c8848593981d2051d6d10b

    • SSDEEP

      3072:ePmXKeALDeYAJoHMWR2Oceh7XVmQdrUJY:NKe4eYHRWApnU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks