General

  • Target

    JaffaCakes118_345840fcaaa9e93ed0e17204d330028e

  • Size

    14.3MB

  • Sample

    250106-xe81qswmgk

  • MD5

    345840fcaaa9e93ed0e17204d330028e

  • SHA1

    5830c492bcc7a3cf2c93a04e34e9aaa1689cc270

  • SHA256

    9affcef96c7a0311b248db4f6b690c2c7105162c76f9eeb35b7729533dc83b24

  • SHA512

    d800b73f7f5f57b3fff7a5489a2d3ea715af79c121b78f0d633ab6b22f220a347812f55e976ec4daa8df7d3be484f37eaf5e58cc5c9d8659ea00bee0c2e819f3

  • SSDEEP

    49152:YzPOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO:Y

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_345840fcaaa9e93ed0e17204d330028e

    • Size

      14.3MB

    • MD5

      345840fcaaa9e93ed0e17204d330028e

    • SHA1

      5830c492bcc7a3cf2c93a04e34e9aaa1689cc270

    • SHA256

      9affcef96c7a0311b248db4f6b690c2c7105162c76f9eeb35b7729533dc83b24

    • SHA512

      d800b73f7f5f57b3fff7a5489a2d3ea715af79c121b78f0d633ab6b22f220a347812f55e976ec4daa8df7d3be484f37eaf5e58cc5c9d8659ea00bee0c2e819f3

    • SSDEEP

      49152:YzPOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO:Y

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks