General

  • Target

    42a54ec9ab074c043308a597ef2cde5c_JaffaCakes118

  • Size

    1.5MB

  • Sample

    240713-vzt17szfmm

  • MD5

    42a54ec9ab074c043308a597ef2cde5c

  • SHA1

    e328c5ab344ba5a12ddea21ca04fa3c2b0ffd9b0

  • SHA256

    7f52f25c1390429e6fd88b1a57e7d320450abaf79adc06996416a0ab08f337bb

  • SHA512

    f7349aa4d52f3ca2ec72acb36a8dc00573ac0ef3e5f370d3ceaf22cfd1c4017cfa21f74f41048cd62f7a0d11cc04225b6927c7c5750e2afd911747a2bb61b4f4

  • SSDEEP

    1536:4nngHkMFzyExf9gzZ+KQuXQsVAJQWW2dwVw7qW3MwY1wHFKMKfcwvjAjrlzEQTlt:4ng1VDZ7sXyX+YkR8GQTziZil

Malware Config

Extracted

Family

redline

Botnet

@DonOfAdverting

C2

185.51.247.144:81

Targets

    • Target

      42a54ec9ab074c043308a597ef2cde5c_JaffaCakes118

    • Size

      1.5MB

    • MD5

      42a54ec9ab074c043308a597ef2cde5c

    • SHA1

      e328c5ab344ba5a12ddea21ca04fa3c2b0ffd9b0

    • SHA256

      7f52f25c1390429e6fd88b1a57e7d320450abaf79adc06996416a0ab08f337bb

    • SHA512

      f7349aa4d52f3ca2ec72acb36a8dc00573ac0ef3e5f370d3ceaf22cfd1c4017cfa21f74f41048cd62f7a0d11cc04225b6927c7c5750e2afd911747a2bb61b4f4

    • SSDEEP

      1536:4nngHkMFzyExf9gzZ+KQuXQsVAJQWW2dwVw7qW3MwY1wHFKMKfcwvjAjrlzEQTlt:4ng1VDZ7sXyX+YkR8GQTziZil

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks