General

  • Target

    84f912a1726176c959e81de6fa63ac26_JaffaCakes118

  • Size

    364KB

  • Sample

    240402-f74haaac42

  • MD5

    84f912a1726176c959e81de6fa63ac26

  • SHA1

    ec37b0c6b1bdebb0aa4882206449e900cdc9a1af

  • SHA256

    012dc07c9d53992f70434c1256b7008c9cd231b674dc908eb519297b979bc771

  • SHA512

    13ba9fb28435fdbd4b5e085bc53dead7e57c2336e631f6f8c3fb5480203e1cb45ba847f46bdd5b853e1943f0953ef6e6ba04bfe5b70be5aefe7c654fe61ae8af

  • SSDEEP

    6144:4/MOJYyJ0FFuvC3EJH82nd34yD3XPaeG0mpeA1qX7tNfVXVHQLIiu8cfo0/pW:KMOayJ0uvo+c84x90C1wZGEX8cA0/M

Malware Config

Extracted

Family

redline

Botnet

shop

C2

45.9.20.107:46187

Attributes
  • auth_value

    60c75f1e2d31f6bac6dd7edad67d8615

Targets

    • Target

      84f912a1726176c959e81de6fa63ac26_JaffaCakes118

    • Size

      364KB

    • MD5

      84f912a1726176c959e81de6fa63ac26

    • SHA1

      ec37b0c6b1bdebb0aa4882206449e900cdc9a1af

    • SHA256

      012dc07c9d53992f70434c1256b7008c9cd231b674dc908eb519297b979bc771

    • SHA512

      13ba9fb28435fdbd4b5e085bc53dead7e57c2336e631f6f8c3fb5480203e1cb45ba847f46bdd5b853e1943f0953ef6e6ba04bfe5b70be5aefe7c654fe61ae8af

    • SSDEEP

      6144:4/MOJYyJ0FFuvC3EJH82nd34yD3XPaeG0mpeA1qX7tNfVXVHQLIiu8cfo0/pW:KMOayJ0uvo+c84x90C1wZGEX8cA0/M

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks