General

  • Target

    JaffaCakes118_0d10631436804ba5b76684f10fb17517

  • Size

    14.7MB

  • Sample

    250106-ejzczsvqhw

  • MD5

    0d10631436804ba5b76684f10fb17517

  • SHA1

    c41468603c6e7724cabcfbfff241f51666dac258

  • SHA256

    df0f634a2cb24945ef754ff49df01e75315a30e5c2aec55899501cde537da4f1

  • SHA512

    4b3a582bbcb90663057b4fcdf22a7e2f695864c719c66a6addd3bc6a0a3dc7678a38dd4d3f8d890eb84087f0813b595895e85eaa4c2406f25931527aa9f1a91a

  • SSDEEP

    3072:N04p67yUtBDBdbhTX/kBKr1UHHojcVKn8eYn/XVn4MfixqktaLBd3qp0039CH44f:itdqBaUHIQc8eYnf1fiwe4aGk9

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_0d10631436804ba5b76684f10fb17517

    • Size

      14.7MB

    • MD5

      0d10631436804ba5b76684f10fb17517

    • SHA1

      c41468603c6e7724cabcfbfff241f51666dac258

    • SHA256

      df0f634a2cb24945ef754ff49df01e75315a30e5c2aec55899501cde537da4f1

    • SHA512

      4b3a582bbcb90663057b4fcdf22a7e2f695864c719c66a6addd3bc6a0a3dc7678a38dd4d3f8d890eb84087f0813b595895e85eaa4c2406f25931527aa9f1a91a

    • SSDEEP

      3072:N04p67yUtBDBdbhTX/kBKr1UHHojcVKn8eYn/XVn4MfixqktaLBd3qp0039CH44f:itdqBaUHIQc8eYnf1fiwe4aGk9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks