General

  • Target

    326c915977a42370e806178161e060b4_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240709-3gg8pasdql

  • MD5

    326c915977a42370e806178161e060b4

  • SHA1

    140bf2bcbc2845f65674fab1e29407da5b869bf8

  • SHA256

    e7dfb670bb6407f251b3e83ffd83332184fa12f47ead9a5cad529adb88f835d9

  • SHA512

    fb392af38f76c9da3352afc4034eb1233ce9ee8e81f49899f12e4d1860f016a9df5fc3d8c98bf68e6624220da32025d5d6265836eed1e6bed111931f89d7b20d

  • SSDEEP

    49152:iZLAulCktXMNVWczmH5F1/ryMW4qxvaeX:MCktozm1rNW4qxva

Malware Config

Extracted

Family

redline

Botnet

@hmmmm2224

C2

185.213.209.36:36533

Targets

    • Target

      326c915977a42370e806178161e060b4_JaffaCakes118

    • Size

      1.5MB

    • MD5

      326c915977a42370e806178161e060b4

    • SHA1

      140bf2bcbc2845f65674fab1e29407da5b869bf8

    • SHA256

      e7dfb670bb6407f251b3e83ffd83332184fa12f47ead9a5cad529adb88f835d9

    • SHA512

      fb392af38f76c9da3352afc4034eb1233ce9ee8e81f49899f12e4d1860f016a9df5fc3d8c98bf68e6624220da32025d5d6265836eed1e6bed111931f89d7b20d

    • SSDEEP

      49152:iZLAulCktXMNVWczmH5F1/ryMW4qxvaeX:MCktozm1rNW4qxva

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks