General

  • Target

    JaffaCakes118_7c2a38a540f8fc122b16114bf6d252fa

  • Size

    12.2MB

  • Sample

    250107-16wq9stkaj

  • MD5

    7c2a38a540f8fc122b16114bf6d252fa

  • SHA1

    6db7d9c26da4e59d8b32a7e64332b3c00b05d2b8

  • SHA256

    2ee579a9f9ebf574254c0da0f2a45fbff896e7864e3b40f95f826943e6f0213b

  • SHA512

    8dd997262da18500f24b8a3bbe04f62e18dbb2f4d3f74f21542cf01c6f02fe60fd0d779b92d60047cc70750f0f640f0fcae82795d02297955315457b53d4fa9f

  • SSDEEP

    49152:PtRCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCf:V

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_7c2a38a540f8fc122b16114bf6d252fa

    • Size

      12.2MB

    • MD5

      7c2a38a540f8fc122b16114bf6d252fa

    • SHA1

      6db7d9c26da4e59d8b32a7e64332b3c00b05d2b8

    • SHA256

      2ee579a9f9ebf574254c0da0f2a45fbff896e7864e3b40f95f826943e6f0213b

    • SHA512

      8dd997262da18500f24b8a3bbe04f62e18dbb2f4d3f74f21542cf01c6f02fe60fd0d779b92d60047cc70750f0f640f0fcae82795d02297955315457b53d4fa9f

    • SSDEEP

      49152:PtRCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCf:V

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks