General

  • Target

    JaffaCakes118_02dc80cd9cf3cff7d95588655037c2f2

  • Size

    11.7MB

  • Sample

    241231-d565aavrds

  • MD5

    02dc80cd9cf3cff7d95588655037c2f2

  • SHA1

    af16e4d5e970f82047ddb1bcf79b7fea1d1883a5

  • SHA256

    1664045584a46d45955ee6a8d0d47df589837c609232653413c515fc3e4bca62

  • SHA512

    cd97ca0c06a2d584b1417173db00def9b70dcfec97e699648bd0fec4f6378b93915dfa2b8abc5bbe211dbcbb92992ee6337755de03c1fcc8da06763e8f5d2123

  • SSDEEP

    49152:+xYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYD:+

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_02dc80cd9cf3cff7d95588655037c2f2

    • Size

      11.7MB

    • MD5

      02dc80cd9cf3cff7d95588655037c2f2

    • SHA1

      af16e4d5e970f82047ddb1bcf79b7fea1d1883a5

    • SHA256

      1664045584a46d45955ee6a8d0d47df589837c609232653413c515fc3e4bca62

    • SHA512

      cd97ca0c06a2d584b1417173db00def9b70dcfec97e699648bd0fec4f6378b93915dfa2b8abc5bbe211dbcbb92992ee6337755de03c1fcc8da06763e8f5d2123

    • SSDEEP

      49152:+xYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYD:+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks