General

  • Target

    fbbd83534d0b9bc916da1ebef9c218aa_JaffaCakes118

  • Size

    263KB

  • Sample

    240420-c35yrsfb5z

  • MD5

    fbbd83534d0b9bc916da1ebef9c218aa

  • SHA1

    24a97e4dd088072a07259120c18f64d8e3d98793

  • SHA256

    1c5eeafca18a55b43c2dea3f4abe2f80f05713a91f0cce411d1d7d491ebc8bd3

  • SHA512

    b0946328887171002281a0b535bb92e832a4d51228f1268b68b63e8698e626a0b30909a17c4534d04bb68c98abad071c403c8a13ca9e1ec2c59fdaadd4025cbe

  • SSDEEP

    3072:Y7lrbIe0o5OQX0HdpGg+N+Oc/QDlLGKNyOlzs8W3GxVddSkBNmdRYTH9OKT0yB3W:YxXT5Ob9pGH429vNHW32Vm89H

Malware Config

Extracted

Family

redline

Botnet

pab4

C2

185.215.113.15:61506

Targets

    • Target

      fbbd83534d0b9bc916da1ebef9c218aa_JaffaCakes118

    • Size

      263KB

    • MD5

      fbbd83534d0b9bc916da1ebef9c218aa

    • SHA1

      24a97e4dd088072a07259120c18f64d8e3d98793

    • SHA256

      1c5eeafca18a55b43c2dea3f4abe2f80f05713a91f0cce411d1d7d491ebc8bd3

    • SHA512

      b0946328887171002281a0b535bb92e832a4d51228f1268b68b63e8698e626a0b30909a17c4534d04bb68c98abad071c403c8a13ca9e1ec2c59fdaadd4025cbe

    • SSDEEP

      3072:Y7lrbIe0o5OQX0HdpGg+N+Oc/QDlLGKNyOlzs8W3GxVddSkBNmdRYTH9OKT0yB3W:YxXT5Ob9pGH429vNHW32Vm89H

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks