General

  • Target

    JaffaCakes118_5dfcaf4e5871ac873611bd6f471ef2fc

  • Size

    12.8MB

  • Sample

    250107-mm7grsyrel

  • MD5

    5dfcaf4e5871ac873611bd6f471ef2fc

  • SHA1

    4e629c67eea486e000f176945c1432db02ff762d

  • SHA256

    f4cfa45ff195fb3fe470b75d9d3c8b6d8a8d8741a6e1401ba5eb494c27dd4090

  • SHA512

    b949db654cc28ae03a1e83953fe608a3990b5dc37d9145ca011d4ba43f0d1d0bc54c18a7c85f648b141230db65d4168701a0ccd0d151ce71b2d4071b201684cb

  • SSDEEP

    6144:kNvMXNc7x72uNJFeTgkYIvpjkHp2e7z+/uyAmMGwDkqyyyyyyyyyyyyyyyyyyyyi:kNvM9i7fNJFeTgk9BjkHp2Euu1mr

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_5dfcaf4e5871ac873611bd6f471ef2fc

    • Size

      12.8MB

    • MD5

      5dfcaf4e5871ac873611bd6f471ef2fc

    • SHA1

      4e629c67eea486e000f176945c1432db02ff762d

    • SHA256

      f4cfa45ff195fb3fe470b75d9d3c8b6d8a8d8741a6e1401ba5eb494c27dd4090

    • SHA512

      b949db654cc28ae03a1e83953fe608a3990b5dc37d9145ca011d4ba43f0d1d0bc54c18a7c85f648b141230db65d4168701a0ccd0d151ce71b2d4071b201684cb

    • SSDEEP

      6144:kNvMXNc7x72uNJFeTgkYIvpjkHp2e7z+/uyAmMGwDkqyyyyyyyyyyyyyyyyyyyyi:kNvM9i7fNJFeTgk9BjkHp2Euu1mr

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks