General

  • Target

    fa6c5e5916bcb56a3bc97aa13844c40f_JaffaCakes118

  • Size

    310KB

  • Sample

    240419-qzsqxseg6s

  • MD5

    fa6c5e5916bcb56a3bc97aa13844c40f

  • SHA1

    a5e2fd1c90c62924306c7547b8217d1a254a9689

  • SHA256

    ac5b4868667c224995dd443eaf547ff02e62cd6debcaa60253722728c87cee26

  • SHA512

    31e0f47b14d1143c3f90f93b216de67be9645c39d179a77ab546d595537584bb6533320487a2f3f9ba88df804bd035ae42655e2896f80d8901506e69b4bf0432

  • SSDEEP

    6144:IPCJBkjI2vit5jQ/pXlOY4f3tQovdJpxJVx98aC3HSH:W2Baxqt5E/t9MtzDH8n6

Malware Config

Extracted

Family

redline

Botnet

sewPalp

C2

185.215.113.29:24645

Attributes
  • auth_value

    41d3df6d093b1e36993abf16af0d6f2d

Targets

    • Target

      fa6c5e5916bcb56a3bc97aa13844c40f_JaffaCakes118

    • Size

      310KB

    • MD5

      fa6c5e5916bcb56a3bc97aa13844c40f

    • SHA1

      a5e2fd1c90c62924306c7547b8217d1a254a9689

    • SHA256

      ac5b4868667c224995dd443eaf547ff02e62cd6debcaa60253722728c87cee26

    • SHA512

      31e0f47b14d1143c3f90f93b216de67be9645c39d179a77ab546d595537584bb6533320487a2f3f9ba88df804bd035ae42655e2896f80d8901506e69b4bf0432

    • SSDEEP

      6144:IPCJBkjI2vit5jQ/pXlOY4f3tQovdJpxJVx98aC3HSH:W2Baxqt5E/t9MtzDH8n6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks