General

  • Target

    3ae6b31b5b81098cf89f75b06743e443_JaffaCakes118

  • Size

    317KB

  • Sample

    240330-nmmb9sef57

  • MD5

    3ae6b31b5b81098cf89f75b06743e443

  • SHA1

    226f792ab7f0e0a75ba135c0e5b4af44b24eca34

  • SHA256

    8c960ca871979147ba1eb212f6331696436b8772fef52f520576450d8a7d3ba1

  • SHA512

    fa707fe920c91dd988708e27792c28b4da870fe62863d11f224a8e7ac7b2625d9f334f32f2fd0df9242ebf6b31cdbf449112b3f0a113ec4c324d684e3ca79be7

  • SSDEEP

    6144:fuehM8I1jwnMZq9vrNN6rl1ciWA7pZiinNR9/Vx98aC3p5dEEc:flhtDnMg1b6B1cDA3JH8np5u

Malware Config

Extracted

Family

redline

Botnet

sewPalp

C2

185.215.113.29:24645

Attributes
  • auth_value

    41d3df6d093b1e36993abf16af0d6f2d

Targets

    • Target

      3ae6b31b5b81098cf89f75b06743e443_JaffaCakes118

    • Size

      317KB

    • MD5

      3ae6b31b5b81098cf89f75b06743e443

    • SHA1

      226f792ab7f0e0a75ba135c0e5b4af44b24eca34

    • SHA256

      8c960ca871979147ba1eb212f6331696436b8772fef52f520576450d8a7d3ba1

    • SHA512

      fa707fe920c91dd988708e27792c28b4da870fe62863d11f224a8e7ac7b2625d9f334f32f2fd0df9242ebf6b31cdbf449112b3f0a113ec4c324d684e3ca79be7

    • SSDEEP

      6144:fuehM8I1jwnMZq9vrNN6rl1ciWA7pZiinNR9/Vx98aC3p5dEEc:flhtDnMg1b6B1cDA3JH8np5u

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks