General

  • Target

    JaffaCakes118_a841a4cf146be49d8368cb6b92aea1be

  • Size

    10.2MB

  • Sample

    250105-q2am5axrbl

  • MD5

    a841a4cf146be49d8368cb6b92aea1be

  • SHA1

    482a1fbe8a24b61c095db3c32a8ee22534ed7af9

  • SHA256

    a5c7112ff3e20b3f66cad4ceaa8c395dc157a94fad24d5aed5202d53c6714306

  • SHA512

    d7122080cbb2fa84183030afb917e8407617c62291adde3048342fc9b38ec0b72d0ba38f224d81a1b18609ece5b63c3f3207ceaf1028b6e21f7a6be1cd3b03eb

  • SSDEEP

    24576:U/FfqVdOBr70Fm0999999999999999999999999999999999999999999999999V:sFU

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_a841a4cf146be49d8368cb6b92aea1be

    • Size

      10.2MB

    • MD5

      a841a4cf146be49d8368cb6b92aea1be

    • SHA1

      482a1fbe8a24b61c095db3c32a8ee22534ed7af9

    • SHA256

      a5c7112ff3e20b3f66cad4ceaa8c395dc157a94fad24d5aed5202d53c6714306

    • SHA512

      d7122080cbb2fa84183030afb917e8407617c62291adde3048342fc9b38ec0b72d0ba38f224d81a1b18609ece5b63c3f3207ceaf1028b6e21f7a6be1cd3b03eb

    • SSDEEP

      24576:U/FfqVdOBr70Fm0999999999999999999999999999999999999999999999999V:sFU

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks