General

  • Target

    JaffaCakes118_36b5d4d05c3fd7041ad27c83dc3e2356

  • Size

    11.7MB

  • Sample

    250106-ycw4tsxpan

  • MD5

    36b5d4d05c3fd7041ad27c83dc3e2356

  • SHA1

    56c07c25b07c58bd7b679d466db0b09b39c6290d

  • SHA256

    17e28b363f99494ceac5dee6f616a0acf5a72bb9a5d49743281e488c116cbe3b

  • SHA512

    249ee1796f211e10573fedbea9e3ef8e2f459f89d590da1901c5b8da4f4bc0525f063743fb99dd11d10955b4c96b56e7b1f7390163697743c9fd65826508f615

  • SSDEEP

    6144:3U7GjEC3ezR7ba5Kr6zFIKBQG18IAHORqctttttttttttttttttttttttttttttN:3U7nZzRva51z2G18IAHeq

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_36b5d4d05c3fd7041ad27c83dc3e2356

    • Size

      11.7MB

    • MD5

      36b5d4d05c3fd7041ad27c83dc3e2356

    • SHA1

      56c07c25b07c58bd7b679d466db0b09b39c6290d

    • SHA256

      17e28b363f99494ceac5dee6f616a0acf5a72bb9a5d49743281e488c116cbe3b

    • SHA512

      249ee1796f211e10573fedbea9e3ef8e2f459f89d590da1901c5b8da4f4bc0525f063743fb99dd11d10955b4c96b56e7b1f7390163697743c9fd65826508f615

    • SSDEEP

      6144:3U7GjEC3ezR7ba5Kr6zFIKBQG18IAHORqctttttttttttttttttttttttttttttN:3U7nZzRva51z2G18IAHeq

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks