General
-
Target
fba04ac6840b68018f2e34cb163cf37b_JaffaCakes118
-
Size
415KB
-
Sample
240928-ghyq6szdqq
-
MD5
fba04ac6840b68018f2e34cb163cf37b
-
SHA1
bb4991c7815bf2b1c2e411b4d7cf74261194d65f
-
SHA256
775e884c62bdb526eb6a26abdd14221782ada4ba4a572741a78757d981e997dc
-
SHA512
d04c749ff6a86c87e012d200720f0ebc9a661ef0b046f5436c8bba788d562e12d0566731163fecf95c532fb1217f51fcce2218805702a5263fdb374a30f747a5
-
SSDEEP
6144:5dRVzSkGTxSLD8uq5CaOPs47bhqUdUtX+t49fkR05tvEAK7/QWzBWJ4:5hqxSLo5C1Ps4XhitX+t498RgtMAYdzB
Static task
static1
Behavioral task
behavioral1
Sample
fba04ac6840b68018f2e34cb163cf37b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fba04ac6840b68018f2e34cb163cf37b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
njrat
0.6.4
HacKed
lptrojan.duckdns.org:1177
83e01e55971481266f4aa1ab6ece4b17
-
reg_key
83e01e55971481266f4aa1ab6ece4b17
-
splitter
|'|'|
Extracted
redline
FiveMMM
185.215.113.55:36801
Targets
-
-
Target
fba04ac6840b68018f2e34cb163cf37b_JaffaCakes118
-
Size
415KB
-
MD5
fba04ac6840b68018f2e34cb163cf37b
-
SHA1
bb4991c7815bf2b1c2e411b4d7cf74261194d65f
-
SHA256
775e884c62bdb526eb6a26abdd14221782ada4ba4a572741a78757d981e997dc
-
SHA512
d04c749ff6a86c87e012d200720f0ebc9a661ef0b046f5436c8bba788d562e12d0566731163fecf95c532fb1217f51fcce2218805702a5263fdb374a30f747a5
-
SSDEEP
6144:5dRVzSkGTxSLD8uq5CaOPs47bhqUdUtX+t49fkR05tvEAK7/QWzBWJ4:5hqxSLo5C1Ps4XhitX+t498RgtMAYdzB
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1