General

  • Target

    JaffaCakes118_9cf563ebcc36d1a641cbbb0c2967b400

  • Size

    11.9MB

  • Sample

    250108-njt8pszpgk

  • MD5

    9cf563ebcc36d1a641cbbb0c2967b400

  • SHA1

    0cb83881694d59b55f57241b7cbe2bd2605792d2

  • SHA256

    fafab94ed21c622e36d2cc03402c17d3975ca5ec0d018cfa224666ec74059c91

  • SHA512

    322b234f4b51d91bb6a8900fc9dc20373168477ebaaa39b21debf4b8d21d1163ca51dca1b5dc6c7d1d851ef00b87a93a39c0043308cee9d36c7b54c3428776b0

  • SSDEEP

    49152:hvUWkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkE:h

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_9cf563ebcc36d1a641cbbb0c2967b400

    • Size

      11.9MB

    • MD5

      9cf563ebcc36d1a641cbbb0c2967b400

    • SHA1

      0cb83881694d59b55f57241b7cbe2bd2605792d2

    • SHA256

      fafab94ed21c622e36d2cc03402c17d3975ca5ec0d018cfa224666ec74059c91

    • SHA512

      322b234f4b51d91bb6a8900fc9dc20373168477ebaaa39b21debf4b8d21d1163ca51dca1b5dc6c7d1d851ef00b87a93a39c0043308cee9d36c7b54c3428776b0

    • SSDEEP

      49152:hvUWkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkE:h

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks