Resubmissions

06-04-2024 07:23

240406-h79emsea89 10

06-04-2024 07:20

240406-h6brzsea63 10

General

  • Target

    debc4398bfd38ad0fc3b66e930f643fa_JaffaCakes118

  • Size

    160KB

  • Sample

    240406-h79emsea89

  • MD5

    debc4398bfd38ad0fc3b66e930f643fa

  • SHA1

    e71df8cc92449bcfd031bb85d5963e5e940ee1c9

  • SHA256

    e96aefb8f07f72ece35d5ad8cb90adf4f5722c01b51664c6f99d6e2bbca3a5d3

  • SHA512

    b24071cf94927bffc8017c18394862827151fcc1c393b4e2ca7e2c998e8fceee03544409f30fbbd0bc1a9ccc282b4f55e010412859307bba17d88c9a1133465a

  • SSDEEP

    3072:TvqZ7ysn9tAbDL9qSbNR/5hYtABQGjHH7s0yOznBYd46B2mCkPi:jA7yZRNLhWANHH7OOziSO2mQ

Malware Config

Extracted

Family

redline

Botnet

@aye22844

C2

51.254.69.209:48987

Attributes
  • auth_value

    ad39d6a8ea7823f2a92f57ebaa4c98a5

Targets

    • Target

      debc4398bfd38ad0fc3b66e930f643fa_JaffaCakes118

    • Size

      160KB

    • MD5

      debc4398bfd38ad0fc3b66e930f643fa

    • SHA1

      e71df8cc92449bcfd031bb85d5963e5e940ee1c9

    • SHA256

      e96aefb8f07f72ece35d5ad8cb90adf4f5722c01b51664c6f99d6e2bbca3a5d3

    • SHA512

      b24071cf94927bffc8017c18394862827151fcc1c393b4e2ca7e2c998e8fceee03544409f30fbbd0bc1a9ccc282b4f55e010412859307bba17d88c9a1133465a

    • SSDEEP

      3072:TvqZ7ysn9tAbDL9qSbNR/5hYtABQGjHH7s0yOznBYd46B2mCkPi:jA7yZRNLhWANHH7OOziSO2mQ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks