General

  • Target

    JaffaCakes118_6efa37fbe1d2b36377422a2bda7ad818ed27eacbae4143ce43074a9ae37dbc64

  • Size

    248KB

  • Sample

    241230-vkt3nasqax

  • MD5

    08e886dbf2ad5dd30be2f1f9074e8fb9

  • SHA1

    3289e1f267778f5ee4cc6497950ca91774a02958

  • SHA256

    6efa37fbe1d2b36377422a2bda7ad818ed27eacbae4143ce43074a9ae37dbc64

  • SHA512

    ca66fe3b0a08c266ed62cde167227cfa326494d14b2094536c8bf0898be7aa5e81b7523c6503529cbaae3ab7cfde31cb2caf85e273626649dad58c7949cfc1c2

  • SSDEEP

    3072:zy013VbzDdITSNw8eLATjcHTkDYTlrjQBK+WrxpzbgqruXhs7sxkgaBChU/pZa9U:e0bzDJAEvs6MCK+uzbgwu6QigabwVf

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_6efa37fbe1d2b36377422a2bda7ad818ed27eacbae4143ce43074a9ae37dbc64

    • Size

      248KB

    • MD5

      08e886dbf2ad5dd30be2f1f9074e8fb9

    • SHA1

      3289e1f267778f5ee4cc6497950ca91774a02958

    • SHA256

      6efa37fbe1d2b36377422a2bda7ad818ed27eacbae4143ce43074a9ae37dbc64

    • SHA512

      ca66fe3b0a08c266ed62cde167227cfa326494d14b2094536c8bf0898be7aa5e81b7523c6503529cbaae3ab7cfde31cb2caf85e273626649dad58c7949cfc1c2

    • SSDEEP

      3072:zy013VbzDdITSNw8eLATjcHTkDYTlrjQBK+WrxpzbgqruXhs7sxkgaBChU/pZa9U:e0bzDJAEvs6MCK+uzbgwu6QigabwVf

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks