General

  • Target

    JaffaCakes118_50f5de9caf57d2964071e9913072ce45

  • Size

    13.0MB

  • Sample

    250107-ggnjtaypck

  • MD5

    50f5de9caf57d2964071e9913072ce45

  • SHA1

    0557009ed61b02e6ab9b83ff752229a754f67aa9

  • SHA256

    d7121e733b9db0b3a06161df0104e10d9155df0f3cce1a54e52c386524bcf201

  • SHA512

    bbbf7cdef48c43492d5c2091a3eda5c5b9ab437009613323d9f7482e4764d2664c7b0380ae8985c1de4eca0a1fb3b4f3d3da34bb9ff21b2f117d0e79e15b88a3

  • SSDEEP

    49152:hOFK1llllllllllllllllllllllllllllllllllllllllllllllllllllllllll1:9

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_50f5de9caf57d2964071e9913072ce45

    • Size

      13.0MB

    • MD5

      50f5de9caf57d2964071e9913072ce45

    • SHA1

      0557009ed61b02e6ab9b83ff752229a754f67aa9

    • SHA256

      d7121e733b9db0b3a06161df0104e10d9155df0f3cce1a54e52c386524bcf201

    • SHA512

      bbbf7cdef48c43492d5c2091a3eda5c5b9ab437009613323d9f7482e4764d2664c7b0380ae8985c1de4eca0a1fb3b4f3d3da34bb9ff21b2f117d0e79e15b88a3

    • SSDEEP

      49152:hOFK1llllllllllllllllllllllllllllllllllllllllllllllllllllllllll1:9

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks