General

  • Target

    3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118

  • Size

    399KB

  • Sample

    240712-lkdagazekb

  • MD5

    3cd7f76ee022ba55e39b8bb0f2cda5dd

  • SHA1

    1e9845b57e551829985fff64415a6168fcd85e25

  • SHA256

    aeb3c60ff4a2c36311ec2d8eda64f82b24c5ad0818e48e7945ec197df3c67169

  • SHA512

    5110ccac07ca52aba04a9f64812eb4c3d9e8a8262e03a68edd0b2259f7917019487854a454a8c49d68f84dd7a1544a0219182c9809a0a34cc90c33f5a25bc973

  • SSDEEP

    6144:m9Veb5KvBOpAaX+1B0kiPNV1eiHf9IohhXf2TGCoTMhud9UqsQObgQL29A2JIhT:mh909SpiUqDj

Malware Config

Extracted

Family

redline

Botnet

@Joindsa

C2

193.32.164.63:3172

Targets

    • Target

      3cd7f76ee022ba55e39b8bb0f2cda5dd_JaffaCakes118

    • Size

      399KB

    • MD5

      3cd7f76ee022ba55e39b8bb0f2cda5dd

    • SHA1

      1e9845b57e551829985fff64415a6168fcd85e25

    • SHA256

      aeb3c60ff4a2c36311ec2d8eda64f82b24c5ad0818e48e7945ec197df3c67169

    • SHA512

      5110ccac07ca52aba04a9f64812eb4c3d9e8a8262e03a68edd0b2259f7917019487854a454a8c49d68f84dd7a1544a0219182c9809a0a34cc90c33f5a25bc973

    • SSDEEP

      6144:m9Veb5KvBOpAaX+1B0kiPNV1eiHf9IohhXf2TGCoTMhud9UqsQObgQL29A2JIhT:mh909SpiUqDj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks