General

  • Target

    cb56c8b9587b7d673f9a31ef1daaad4d_JaffaCakes118

  • Size

    363KB

  • Sample

    240405-fhwq5sda66

  • MD5

    cb56c8b9587b7d673f9a31ef1daaad4d

  • SHA1

    c184c9aadf5b196cf6d2d30ca2902cbc476d9808

  • SHA256

    f79edc777c22fecfe033890a6541e0da5655ae2c7ba804be77205e30105475cb

  • SHA512

    891a58a5aa789e6a7b065f3f2f5e26a9e4924b114ab91c7c9e458f153bce312a406a37ecb9b874aa3599360079ef121689864e2c3ab425644738125da5b08589

  • SSDEEP

    6144:YjKakysoc2KGZhZdJXr3Z5egFuBNWge7JyGWNfJOhu:a5kLo9hZP3Z8gF8WeGWNfq

Malware Config

Extracted

Family

redline

Botnet

PUB

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      cb56c8b9587b7d673f9a31ef1daaad4d_JaffaCakes118

    • Size

      363KB

    • MD5

      cb56c8b9587b7d673f9a31ef1daaad4d

    • SHA1

      c184c9aadf5b196cf6d2d30ca2902cbc476d9808

    • SHA256

      f79edc777c22fecfe033890a6541e0da5655ae2c7ba804be77205e30105475cb

    • SHA512

      891a58a5aa789e6a7b065f3f2f5e26a9e4924b114ab91c7c9e458f153bce312a406a37ecb9b874aa3599360079ef121689864e2c3ab425644738125da5b08589

    • SSDEEP

      6144:YjKakysoc2KGZhZdJXr3Z5egFuBNWge7JyGWNfJOhu:a5kLo9hZP3Z8gF8WeGWNfq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks