General

  • Target

    JaffaCakes118_52f93bb73ff8446b36a885d7cbf949a32740e8a7f8f5af3152cc402940b12b33

  • Size

    277KB

  • Sample

    241230-ha121a1kdm

  • MD5

    4414f4165580b1cee38b46abc9e404ed

  • SHA1

    6e39fcb13209a4683d3b74f9bd5ce0f67b4c8dc1

  • SHA256

    52f93bb73ff8446b36a885d7cbf949a32740e8a7f8f5af3152cc402940b12b33

  • SHA512

    2d6f542377d583b45428605650aead53f837c76d7b44f177143f8885352d98838f638a5817cbf41d4713eb816565a6f11e90ac12e08e4f1df3c564277c293a45

  • SSDEEP

    3072:n0ZpS7y4OGK7t1wzsBj694paz55PP/w4MOduPbeujgAB34LYVmjo4FUrPfoiL4m/:VdqXw4B29jPBUbeufBoc4jo4md8mrz

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_52f93bb73ff8446b36a885d7cbf949a32740e8a7f8f5af3152cc402940b12b33

    • Size

      277KB

    • MD5

      4414f4165580b1cee38b46abc9e404ed

    • SHA1

      6e39fcb13209a4683d3b74f9bd5ce0f67b4c8dc1

    • SHA256

      52f93bb73ff8446b36a885d7cbf949a32740e8a7f8f5af3152cc402940b12b33

    • SHA512

      2d6f542377d583b45428605650aead53f837c76d7b44f177143f8885352d98838f638a5817cbf41d4713eb816565a6f11e90ac12e08e4f1df3c564277c293a45

    • SSDEEP

      3072:n0ZpS7y4OGK7t1wzsBj694paz55PP/w4MOduPbeujgAB34LYVmjo4FUrPfoiL4m/:VdqXw4B29jPBUbeufBoc4jo4md8mrz

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks