Malware Analysis Report

2025-06-16 01:48

Sample ID 240406-qvj8zsbd9t
Target e2a78498d4f146153f6212ed01e698d8_JaffaCakes118
SHA256 c0d9890c15842c30d526025f7678e09b216020c3dc935b0d4cfa102c7eb9ae2c
Tags
redline sectoprat 30.08 infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c0d9890c15842c30d526025f7678e09b216020c3dc935b0d4cfa102c7eb9ae2c

Threat Level: Known bad

The file e2a78498d4f146153f6212ed01e698d8_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

redline sectoprat 30.08 infostealer rat trojan

SectopRAT payload

RedLine

RedLine payload

SectopRAT

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-06 13:34

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-06 13:34

Reported

2024-04-06 13:37

Platform

win10v2004-20231215-en

Max time kernel

141s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e2a78498d4f146153f6212ed01e698d8_JaffaCakes118.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e2a78498d4f146153f6212ed01e698d8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e2a78498d4f146153f6212ed01e698d8_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 225.238.32.23.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
RU 185.215.113.17:48236 tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
RU 185.215.113.17:48236 tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 17.143.109.104.in-addr.arpa udp
RU 185.215.113.17:48236 tcp
US 8.8.8.8:53 239.249.30.184.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
RU 185.215.113.17:48236 tcp
RU 185.215.113.17:48236 tcp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
RU 185.215.113.17:48236 tcp
RU 185.215.113.17:48236 tcp

Files

memory/3556-1-0x0000000001E70000-0x0000000001F70000-memory.dmp

memory/3556-2-0x0000000001E30000-0x0000000001E60000-memory.dmp

memory/3556-4-0x0000000000400000-0x0000000001D9C000-memory.dmp

memory/3556-3-0x0000000003E50000-0x0000000003E76000-memory.dmp

memory/3556-5-0x00000000065B0000-0x00000000065C0000-memory.dmp

memory/3556-7-0x0000000075120000-0x00000000758D0000-memory.dmp

memory/3556-9-0x0000000003FF0000-0x0000000004014000-memory.dmp

memory/3556-8-0x00000000065B0000-0x00000000065C0000-memory.dmp

memory/3556-6-0x00000000065C0000-0x0000000006B64000-memory.dmp

memory/3556-10-0x0000000006B70000-0x0000000007188000-memory.dmp

memory/3556-11-0x00000000064F0000-0x0000000006502000-memory.dmp

memory/3556-12-0x0000000007190000-0x000000000729A000-memory.dmp

memory/3556-13-0x00000000065B0000-0x00000000065C0000-memory.dmp

memory/3556-14-0x0000000006510000-0x000000000654C000-memory.dmp

memory/3556-15-0x00000000072A0000-0x00000000072EC000-memory.dmp

memory/3556-16-0x0000000000400000-0x0000000001D9C000-memory.dmp

memory/3556-17-0x0000000001E30000-0x0000000001E60000-memory.dmp

memory/3556-18-0x0000000001E70000-0x0000000001F70000-memory.dmp

memory/3556-20-0x00000000065B0000-0x00000000065C0000-memory.dmp

memory/3556-21-0x00000000065B0000-0x00000000065C0000-memory.dmp

memory/3556-22-0x0000000075120000-0x00000000758D0000-memory.dmp

memory/3556-23-0x00000000065B0000-0x00000000065C0000-memory.dmp

memory/3556-24-0x00000000065B0000-0x00000000065C0000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-06 13:34

Reported

2024-04-06 13:37

Platform

win7-20240221-en

Max time kernel

148s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e2a78498d4f146153f6212ed01e698d8_JaffaCakes118.exe"

Signatures

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e2a78498d4f146153f6212ed01e698d8_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e2a78498d4f146153f6212ed01e698d8_JaffaCakes118.exe"

Network

Country Destination Domain Proto
RU 185.215.113.17:48236 tcp
RU 185.215.113.17:48236 tcp
RU 185.215.113.17:48236 tcp
RU 185.215.113.17:48236 tcp
RU 185.215.113.17:48236 tcp
RU 185.215.113.17:48236 tcp
RU 185.215.113.17:48236 tcp
RU 185.215.113.17:48236 tcp

Files

memory/2936-1-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2936-2-0x0000000000260000-0x0000000000290000-memory.dmp

memory/2936-3-0x0000000003820000-0x0000000003846000-memory.dmp

memory/2936-4-0x0000000000400000-0x0000000001D9C000-memory.dmp

memory/2936-5-0x0000000003C30000-0x0000000003C70000-memory.dmp

memory/2936-6-0x00000000744E0000-0x0000000074BCE000-memory.dmp

memory/2936-8-0x0000000003C30000-0x0000000003C70000-memory.dmp

memory/2936-7-0x0000000003C30000-0x0000000003C70000-memory.dmp

memory/2936-9-0x0000000003860000-0x0000000003884000-memory.dmp

memory/2936-10-0x0000000003C30000-0x0000000003C70000-memory.dmp

memory/2936-12-0x0000000003C30000-0x0000000003C70000-memory.dmp

memory/2936-13-0x0000000000290000-0x0000000000390000-memory.dmp

memory/2936-15-0x00000000744E0000-0x0000000074BCE000-memory.dmp

memory/2936-16-0x0000000003C30000-0x0000000003C70000-memory.dmp