General

  • Target

    JaffaCakes118_b460616088a594b836f543781bdc3a8b

  • Size

    13.3MB

  • Sample

    250109-ah2z9szjds

  • MD5

    b460616088a594b836f543781bdc3a8b

  • SHA1

    d92a604e9fed031bd726c2fa161ffce3e25bb385

  • SHA256

    2bbd19cdc916f6515245ccd581791d15090f06204179e934f05a92c1bff87625

  • SHA512

    e09aede42b84304d8ba1cd2e33d6adeccdd85cc24d215cc092d000f5abddb434573a63d42abdf928451aaeb9f386d60e993097dd8dab261b96ccdd660d64cc3a

  • SSDEEP

    49152:f1m333333333333333333333333333333333333333333333333333333333333n:

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_b460616088a594b836f543781bdc3a8b

    • Size

      13.3MB

    • MD5

      b460616088a594b836f543781bdc3a8b

    • SHA1

      d92a604e9fed031bd726c2fa161ffce3e25bb385

    • SHA256

      2bbd19cdc916f6515245ccd581791d15090f06204179e934f05a92c1bff87625

    • SHA512

      e09aede42b84304d8ba1cd2e33d6adeccdd85cc24d215cc092d000f5abddb434573a63d42abdf928451aaeb9f386d60e993097dd8dab261b96ccdd660d64cc3a

    • SSDEEP

      49152:f1m333333333333333333333333333333333333333333333333333333333333n:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks