General

  • Target

    JaffaCakes118_010d8301c1f6d3953fde5e115bef1fdd

  • Size

    13.8MB

  • Sample

    250105-29ywga1kgk

  • MD5

    010d8301c1f6d3953fde5e115bef1fdd

  • SHA1

    fe225b1ab183a61f2a1cfc2434f5e23769a1ac7a

  • SHA256

    e44d53782bd777950f51c933a0d1b576c7804456d3cc87ad63f44b7dc424e817

  • SHA512

    5a9a48365f219de04aab19769109a7ee4f12f0ece9d8e9e2dbdfef108082d95920db193dd4b73448b233f581c021240267796a7f77fc997c12513a6f8f577464

  • SSDEEP

    196608:kxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx3:

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_010d8301c1f6d3953fde5e115bef1fdd

    • Size

      13.8MB

    • MD5

      010d8301c1f6d3953fde5e115bef1fdd

    • SHA1

      fe225b1ab183a61f2a1cfc2434f5e23769a1ac7a

    • SHA256

      e44d53782bd777950f51c933a0d1b576c7804456d3cc87ad63f44b7dc424e817

    • SHA512

      5a9a48365f219de04aab19769109a7ee4f12f0ece9d8e9e2dbdfef108082d95920db193dd4b73448b233f581c021240267796a7f77fc997c12513a6f8f577464

    • SSDEEP

      196608:kxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx3:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks