Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
11550a366868d073126f859bac643814_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
11550a366868d073126f859bac643814_JaffaCakes118.exe
-
Size
283KB
-
MD5
11550a366868d073126f859bac643814
-
SHA1
c3092c71f8fc96a0cc1fee4ce7b00abfb6f49545
-
SHA256
823a05b3f49eca93a3cb573b3e49e19b370843381d68518c12fbcbdabb49e45d
-
SHA512
c9b0a15eedf72999aed6c0091ae9205299839242fe748ce2bdfdeef84a0a1ada7f2b0495a623e93bb4621bb125425426d3434db431f741c1753c333d46390468
-
SSDEEP
6144:P8xlQK9CqZcJE+7dsO/V4odMcA+MQPQvcPI1A2uSz+h:0x5VZcJEYOm9Q8I1AS+h
Malware Config
Extracted
redline
PUB
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/1880-5-0x0000000002370000-0x0000000002396000-memory.dmp family_redline behavioral2/memory/1880-7-0x00000000026C0000-0x00000000026E4000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/1880-5-0x0000000002370000-0x0000000002396000-memory.dmp family_sectoprat behavioral2/memory/1880-7-0x00000000026C0000-0x00000000026E4000-memory.dmp family_sectoprat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11550a366868d073126f859bac643814_JaffaCakes118.exe