General

  • Target

    JaffaCakes118_8a339c17be9170dbbeb313831717a7e3

  • Size

    10.6MB

  • Sample

    250108-em5zyavrgl

  • MD5

    8a339c17be9170dbbeb313831717a7e3

  • SHA1

    23ced3569ab8478bce1023900101d902309ff0d3

  • SHA256

    8b254ac23621062699afd739cf14061671517bb41e95ee4216cce5aac52f6fb5

  • SHA512

    0c4f679ee20b41891097ed27e8c37e97aa04924eec6626c582d8b6a1489577189f83a329798db6ae7dcdc29cb41f0b25286d637a028939d1981a891fee9081bf

  • SSDEEP

    196608:AxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxR:

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_8a339c17be9170dbbeb313831717a7e3

    • Size

      10.6MB

    • MD5

      8a339c17be9170dbbeb313831717a7e3

    • SHA1

      23ced3569ab8478bce1023900101d902309ff0d3

    • SHA256

      8b254ac23621062699afd739cf14061671517bb41e95ee4216cce5aac52f6fb5

    • SHA512

      0c4f679ee20b41891097ed27e8c37e97aa04924eec6626c582d8b6a1489577189f83a329798db6ae7dcdc29cb41f0b25286d637a028939d1981a891fee9081bf

    • SSDEEP

      196608:AxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxR:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks