General

  • Target

    fddbd8935568b976d3ee3758100b999c_JaffaCakes118

  • Size

    427KB

  • Sample

    240420-22z4kacc63

  • MD5

    fddbd8935568b976d3ee3758100b999c

  • SHA1

    438a1f2adc8d3c7133a92df3c7d7eb4da9ecc7c5

  • SHA256

    58c4aa42b62b513e2e90459971cfe7f01b1bb8e5d18fd2351d26d007a6c09345

  • SHA512

    c4bbcebb26070277b42472042f1610da30b9c3cd8f7d677db9451c8069cecf81f4d1a6ce79a94b1054eb8c265e3d5f1ea0357e6a3331747bbe96b5c1e5f44408

  • SSDEEP

    12288:+me8N9YbUHjlmAqaaSnx/fZZZ8fhUeAFCQ3Oecmhr:1e8N9YbUDXwQxJZhFCQeU

Malware Config

Extracted

Family

redline

Botnet

paladin

C2

37.228.129.48:29795

Attributes
  • auth_value

    f27db372188045eefdf974196ead3dae

Targets

    • Target

      fddbd8935568b976d3ee3758100b999c_JaffaCakes118

    • Size

      427KB

    • MD5

      fddbd8935568b976d3ee3758100b999c

    • SHA1

      438a1f2adc8d3c7133a92df3c7d7eb4da9ecc7c5

    • SHA256

      58c4aa42b62b513e2e90459971cfe7f01b1bb8e5d18fd2351d26d007a6c09345

    • SHA512

      c4bbcebb26070277b42472042f1610da30b9c3cd8f7d677db9451c8069cecf81f4d1a6ce79a94b1054eb8c265e3d5f1ea0357e6a3331747bbe96b5c1e5f44408

    • SSDEEP

      12288:+me8N9YbUHjlmAqaaSnx/fZZZ8fhUeAFCQ3Oecmhr:1e8N9YbUDXwQxJZhFCQeU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks