General

  • Target

    JaffaCakes118_00671df357ed0592f04e4d33c3703604

  • Size

    333KB

  • Sample

    250105-2zgt7szrdl

  • MD5

    00671df357ed0592f04e4d33c3703604

  • SHA1

    38dbdb0fd9f8b6d4bcf0639604f25fd7e513c69f

  • SHA256

    fd3dc0471381c2c032b31d76bccf7e126526dd9448066ca9d35e1e62e1a188b3

  • SHA512

    fbc9bc3aa3e5781033ae1c06d0862e7fde17cd9ed47e1451fc2bc4ef96b7d2936b1e7ba9cb464d846dd7146fd3d7613f2bd94cd892e08ceb118d2c7b6d487a93

  • SSDEEP

    6144:xOYmVlRyNQpj0ViCx2xKxc9Sh/KXl/wLWlWC8RzZap6:xW7Rw2j0VmKqgJKXlwGeVZ

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_00671df357ed0592f04e4d33c3703604

    • Size

      333KB

    • MD5

      00671df357ed0592f04e4d33c3703604

    • SHA1

      38dbdb0fd9f8b6d4bcf0639604f25fd7e513c69f

    • SHA256

      fd3dc0471381c2c032b31d76bccf7e126526dd9448066ca9d35e1e62e1a188b3

    • SHA512

      fbc9bc3aa3e5781033ae1c06d0862e7fde17cd9ed47e1451fc2bc4ef96b7d2936b1e7ba9cb464d846dd7146fd3d7613f2bd94cd892e08ceb118d2c7b6d487a93

    • SSDEEP

      6144:xOYmVlRyNQpj0ViCx2xKxc9Sh/KXl/wLWlWC8RzZap6:xW7Rw2j0VmKqgJKXlwGeVZ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks