General

  • Target

    JaffaCakes118_7399178568161f5a5da8b869e9736716

  • Size

    10.5MB

  • Sample

    250107-xgkqxstmhv

  • MD5

    7399178568161f5a5da8b869e9736716

  • SHA1

    08554ea0af56007bb7d46125db489632f83ef166

  • SHA256

    8dfa3d272288ee3e4fdfa6f4c04094dd9e9bc955d62a8dbe99b28b09f35244b8

  • SHA512

    44e4b3b7f7b5a83f0ac02b98b62da54a333f12a9400cdfb0765abb26ed35556b3a7da46ba8da4298170e97263bb58eab6fe45249e4293c069c242bd022f4811c

  • SSDEEP

    12288:jnWdwQB3a1ZAXYlVR7jbMviJvK3SRL/R/R/R/R/R/R/R/R/R/R/R/R/R/R/R/R/1:jnWdFB3a1ZLlsviJv

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_7399178568161f5a5da8b869e9736716

    • Size

      10.5MB

    • MD5

      7399178568161f5a5da8b869e9736716

    • SHA1

      08554ea0af56007bb7d46125db489632f83ef166

    • SHA256

      8dfa3d272288ee3e4fdfa6f4c04094dd9e9bc955d62a8dbe99b28b09f35244b8

    • SHA512

      44e4b3b7f7b5a83f0ac02b98b62da54a333f12a9400cdfb0765abb26ed35556b3a7da46ba8da4298170e97263bb58eab6fe45249e4293c069c242bd022f4811c

    • SSDEEP

      12288:jnWdwQB3a1ZAXYlVR7jbMviJvK3SRL/R/R/R/R/R/R/R/R/R/R/R/R/R/R/R/R/1:jnWdFB3a1ZLlsviJv

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks