General
-
Target
61ac706f77b6da4bda821e69aef5d27a_JaffaCakes118
-
Size
4.1MB
-
Sample
240331-3v96maff71
-
MD5
61ac706f77b6da4bda821e69aef5d27a
-
SHA1
ee42220eb9ec46f8788215e71ffdbc136b762cb3
-
SHA256
6cbec8e331ea6136527401482a98b45e861beab8c7381eb19a135dc9a3bd9fb5
-
SHA512
3dc17b1a8ee9b4658ab0e462b49642bcdb4cbdf39b21f6da351843f2a550d5dccd953f75b0fff5b4587da189fccbdc75d1a5cd72cc238b378f7b5145029ef2cd
-
SSDEEP
98304:Pb0DpTItDjUlc5xRsYQCMi2hjHWVhh0zm+0Tp5rboe5jRK:P6QDiMoCMiYjChhx+2p5Poe5w
Static task
static1
Malware Config
Extracted
ffdroider
http://186.2.171.3
Extracted
redline
PUB
45.9.20.182:52236
-
auth_value
a272f3a2850ec3dccdaed97234b7c40e
Extracted
redline
05.10
80.92.205.116:59599
-
auth_value
9987bbbfa5d086577a66d521ae15b57e
Extracted
redline
build777
77.232.40.127:8204
-
auth_value
275ce2c87153d4e8e3cc276c686a93de
Extracted
redline
ANI222
194.104.136.5:46013
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Extracted
privateloader
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
gcleaner
ppp-gl.biz
45.9.20.13
Targets
-
-
Target
61ac706f77b6da4bda821e69aef5d27a_JaffaCakes118
-
Size
4.1MB
-
MD5
61ac706f77b6da4bda821e69aef5d27a
-
SHA1
ee42220eb9ec46f8788215e71ffdbc136b762cb3
-
SHA256
6cbec8e331ea6136527401482a98b45e861beab8c7381eb19a135dc9a3bd9fb5
-
SHA512
3dc17b1a8ee9b4658ab0e462b49642bcdb4cbdf39b21f6da351843f2a550d5dccd953f75b0fff5b4587da189fccbdc75d1a5cd72cc238b378f7b5145029ef2cd
-
SSDEEP
98304:Pb0DpTItDjUlc5xRsYQCMi2hjHWVhh0zm+0Tp5rboe5jRK:P6QDiMoCMiYjChhx+2p5Poe5w
-
Detect Fabookie payload
-
FFDroider payload
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
OnlyLogger payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-