General

  • Target

    JaffaCakes118_ea71620aae3be1fecd9e4f8544640c7c

  • Size

    10.5MB

  • Sample

    250110-whwddatnem

  • MD5

    ea71620aae3be1fecd9e4f8544640c7c

  • SHA1

    bef3abbd3233227300d06374e87d757ebf9419f0

  • SHA256

    ecbc8d6bdb6d25e1d6e8083a9992b344bd8bd5c6672a26cd08cd63659b2fe122

  • SHA512

    1afe3dbce7270aa4dbbcf37c452d9d2ddac3e11f55553427c1bc9fdbec73c4c2f2b1e4bea52da2784222d08a6c7227037c3eb0872a234e62ee270c759cdb1f37

  • SSDEEP

    49152:IN5555555555555555555555555555555555555555555555555555555555555H:

Malware Config

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Targets

    • Target

      JaffaCakes118_ea71620aae3be1fecd9e4f8544640c7c

    • Size

      10.5MB

    • MD5

      ea71620aae3be1fecd9e4f8544640c7c

    • SHA1

      bef3abbd3233227300d06374e87d757ebf9419f0

    • SHA256

      ecbc8d6bdb6d25e1d6e8083a9992b344bd8bd5c6672a26cd08cd63659b2fe122

    • SHA512

      1afe3dbce7270aa4dbbcf37c452d9d2ddac3e11f55553427c1bc9fdbec73c4c2f2b1e4bea52da2784222d08a6c7227037c3eb0872a234e62ee270c759cdb1f37

    • SSDEEP

      49152:IN5555555555555555555555555555555555555555555555555555555555555H:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks