General

  • Target

    0f7db123d145142719c707374a5848a4_JaffaCakes118

  • Size

    808KB

  • Sample

    240328-zfffxsgg57

  • MD5

    0f7db123d145142719c707374a5848a4

  • SHA1

    b2a03dbf263d4a50caf841fbb00ffa8f0f071ee1

  • SHA256

    579214390f165480aa3ff4991f1a6eb8b6d946dc02e9ecc075a7b816e9ffdfba

  • SHA512

    0e5e7dd009452dbb7e32ee34f65e4a2336f20ca19f596c3ba82131d130a0ce9bf6b7f15e4258de1f1eb5b932f9b499e95bf15c05dd096d0160427d3161f744c1

  • SSDEEP

    12288:F1FwPtoB/POTISLoKiGmRh0Mpjm8LWUNGkIPP5QlzNl26TieMdWLnYn2gM2M/tHh:vFwPtoB/PA7niRpOhONTieTnYn2g6tHh

Malware Config

Extracted

Family

redline

Botnet

01

C2

176.57.71.68:37814

Attributes
  • auth_value

    6e134fbe11e1fba7052c029b94245b55

Targets

    • Target

      0f7db123d145142719c707374a5848a4_JaffaCakes118

    • Size

      808KB

    • MD5

      0f7db123d145142719c707374a5848a4

    • SHA1

      b2a03dbf263d4a50caf841fbb00ffa8f0f071ee1

    • SHA256

      579214390f165480aa3ff4991f1a6eb8b6d946dc02e9ecc075a7b816e9ffdfba

    • SHA512

      0e5e7dd009452dbb7e32ee34f65e4a2336f20ca19f596c3ba82131d130a0ce9bf6b7f15e4258de1f1eb5b932f9b499e95bf15c05dd096d0160427d3161f744c1

    • SSDEEP

      12288:F1FwPtoB/POTISLoKiGmRh0Mpjm8LWUNGkIPP5QlzNl26TieMdWLnYn2gM2M/tHh:vFwPtoB/PA7niRpOhONTieTnYn2g6tHh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks