General

  • Target

    JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d

  • Size

    13.0MB

  • Sample

    250109-gkqtcatjek

  • MD5

    c06dc6483f2ab9064f7178fd90c2078d

  • SHA1

    41d6de655653c97af24ba3330525491c183c30a8

  • SHA256

    fbeadcb0b5279e7fce975f8fa2b0bf014b39068553feb774e51ceaf2d86b7215

  • SHA512

    d15613202579cf337e31363a4ce33f643fe52509da3b329139b89d3e0e715eb9bae872250c2595232a52dcbc9fa6cc991bcd04ff9e3e7668b6ed5a9d9a49a665

  • SSDEEP

    196608:YuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuX:

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_c06dc6483f2ab9064f7178fd90c2078d

    • Size

      13.0MB

    • MD5

      c06dc6483f2ab9064f7178fd90c2078d

    • SHA1

      41d6de655653c97af24ba3330525491c183c30a8

    • SHA256

      fbeadcb0b5279e7fce975f8fa2b0bf014b39068553feb774e51ceaf2d86b7215

    • SHA512

      d15613202579cf337e31363a4ce33f643fe52509da3b329139b89d3e0e715eb9bae872250c2595232a52dcbc9fa6cc991bcd04ff9e3e7668b6ed5a9d9a49a665

    • SSDEEP

      196608:YuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuX:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks