Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 16:06
Static task
static1
Behavioral task
behavioral1
Sample
e551858d7c25a5874ac81a13ca3ca24d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
e551858d7c25a5874ac81a13ca3ca24d_JaffaCakes118.exe
-
Size
823KB
-
MD5
e551858d7c25a5874ac81a13ca3ca24d
-
SHA1
a8b4217a9e68264e72c416b5c33dbc403c7acd3c
-
SHA256
f9349003a92f82606eede0b5ebd94af025f1a2a76a481df38075723e3af054be
-
SHA512
18be299b1156c490b381aa5b385a899113cf2c97225e01bb4120a4c1671d74496180495902603d0c34755040f1f54dbf682398b56d39ea1d47c0e74b109c644b
-
SSDEEP
24576:JpvpuWmWKD9dFEU2RaUZtDi094WoH3jnF:PrmWenUzu094tX5
Malware Config
Extracted
redline
@pankoka
185.244.217.166:56316
-
auth_value
026e3efe08173cd9cc43c61448ed20f6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1752-0-0x0000000000430000-0x0000000000461000-memory.dmp family_redline behavioral2/memory/1752-7-0x0000000000430000-0x0000000000461000-memory.dmp family_redline behavioral2/memory/1752-8-0x0000000000950000-0x0000000000972000-memory.dmp family_redline -
SectopRAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1752-0-0x0000000000430000-0x0000000000461000-memory.dmp family_sectoprat behavioral2/memory/1752-7-0x0000000000430000-0x0000000000461000-memory.dmp family_sectoprat behavioral2/memory/1752-8-0x0000000000950000-0x0000000000972000-memory.dmp family_sectoprat behavioral2/memory/1752-20-0x00000000052F0000-0x0000000005300000-memory.dmp family_sectoprat
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1752-0-0x0000000000430000-0x0000000000461000-memory.dmpFilesize
196KB
-
memory/1752-7-0x0000000000430000-0x0000000000461000-memory.dmpFilesize
196KB
-
memory/1752-9-0x0000000075210000-0x00000000759C0000-memory.dmpFilesize
7.7MB
-
memory/1752-8-0x0000000000950000-0x0000000000972000-memory.dmpFilesize
136KB
-
memory/1752-10-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/1752-11-0x0000000005300000-0x0000000005918000-memory.dmpFilesize
6.1MB
-
memory/1752-12-0x0000000002980000-0x0000000002992000-memory.dmpFilesize
72KB
-
memory/1752-13-0x0000000005120000-0x000000000522A000-memory.dmpFilesize
1.0MB
-
memory/1752-14-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/1752-15-0x0000000005230000-0x000000000526C000-memory.dmpFilesize
240KB
-
memory/1752-16-0x0000000005280000-0x00000000052CC000-memory.dmpFilesize
304KB
-
memory/1752-17-0x0000000000500000-0x00000000005D4000-memory.dmpFilesize
848KB
-
memory/1752-18-0x0000000075210000-0x00000000759C0000-memory.dmpFilesize
7.7MB
-
memory/1752-20-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/1752-21-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/1752-22-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB