General

  • Target

    c527823492941b2636e434f9b8990586_JaffaCakes118

  • Size

    384KB

  • Sample

    240404-3xpygaea91

  • MD5

    c527823492941b2636e434f9b8990586

  • SHA1

    e4c7cf13deea87ce76b1c7dfff07ce79a878eb95

  • SHA256

    7bb8b30e313fdaf59436480f79d53e06dd7d11120444a2eca13c487ebcf41e4a

  • SHA512

    ad92019fad714e62ed264677fc459e13b554f52a7e0bf87424940b92fdeb3b43671849413d67044a6a4591383f0483b78e28d11be0898fb4cda85a97bfd8f8d1

  • SSDEEP

    6144:U2Mj6T1EUyMr7Vvah200/wuucq4EanL6S3vTeU6nP0X37BHY5eeTGXR:xPYMr7Vva50/nun5anuS37unPCBHyz+R

Malware Config

Extracted

Family

redline

Botnet

sewPalp

C2

185.215.113.29:24645

Attributes
  • auth_value

    41d3df6d093b1e36993abf16af0d6f2d

Targets

    • Target

      c527823492941b2636e434f9b8990586_JaffaCakes118

    • Size

      384KB

    • MD5

      c527823492941b2636e434f9b8990586

    • SHA1

      e4c7cf13deea87ce76b1c7dfff07ce79a878eb95

    • SHA256

      7bb8b30e313fdaf59436480f79d53e06dd7d11120444a2eca13c487ebcf41e4a

    • SHA512

      ad92019fad714e62ed264677fc459e13b554f52a7e0bf87424940b92fdeb3b43671849413d67044a6a4591383f0483b78e28d11be0898fb4cda85a97bfd8f8d1

    • SSDEEP

      6144:U2Mj6T1EUyMr7Vvah200/wuucq4EanL6S3vTeU6nP0X37BHY5eeTGXR:xPYMr7Vva50/nun5anuS37unPCBHyz+R

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks