General

  • Target

    8fcc38d316adbd309ffd50d3d5ea0278_JaffaCakes118

  • Size

    309KB

  • Sample

    240402-sf3swsdg6t

  • MD5

    8fcc38d316adbd309ffd50d3d5ea0278

  • SHA1

    dfb447c23c80f23ad9b36bd3cb8ddc7ff0c53e49

  • SHA256

    c18a4872c385663b087a4b0ce9eb658c6c9de484a60e87c4b9967502161e228c

  • SHA512

    cc7a6f80210aad203520ef1070f17098bd033c6161e33ff28cf0371bce739ac1628f65fd22c8651806b5eac4c7f81b21ffa0b2532984d506c4e6dfb6859460fa

  • SSDEEP

    6144:DFfzUmt+OwXSFCwO7gh7VLAZCmVNsXWqjjwmDW5St:BLUmtvwCFC9ghmVOWqLW5St

Malware Config

Extracted

Family

redline

Botnet

usamoney

C2

45.142.215.47:27643

Attributes
  • auth_value

    9491a1c5e11eb6097e68a4fa8627fda8

Targets

    • Target

      8fcc38d316adbd309ffd50d3d5ea0278_JaffaCakes118

    • Size

      309KB

    • MD5

      8fcc38d316adbd309ffd50d3d5ea0278

    • SHA1

      dfb447c23c80f23ad9b36bd3cb8ddc7ff0c53e49

    • SHA256

      c18a4872c385663b087a4b0ce9eb658c6c9de484a60e87c4b9967502161e228c

    • SHA512

      cc7a6f80210aad203520ef1070f17098bd033c6161e33ff28cf0371bce739ac1628f65fd22c8651806b5eac4c7f81b21ffa0b2532984d506c4e6dfb6859460fa

    • SSDEEP

      6144:DFfzUmt+OwXSFCwO7gh7VLAZCmVNsXWqjjwmDW5St:BLUmtvwCFC9ghmVOWqLW5St

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks