General

  • Target

    424ff83911ab4cab3ea0cd2e11731762_JaffaCakes118

  • Size

    432KB

  • Sample

    241013-1yhvfavgll

  • MD5

    424ff83911ab4cab3ea0cd2e11731762

  • SHA1

    c02c4fc71918a134a141c29b79513738eb939aac

  • SHA256

    5e1e38c73cf7b0484b741b5826ddb0e968d630bec918925592dc51157e11757f

  • SHA512

    06b06d3c34ba9e14cdf238930717fc75609b8106b5e31568b64e8c18c23f00c4c284b110d145c4ef3d92754061b164e7892feb3c80be6b03b838055ca05c716d

  • SSDEEP

    6144:Y2jOyVRlhl/oD5b/gn0ACW03PYhtBT4TCgHMtOe0TLQ3nHIEJ9zgWzbcl9txCYAH:YcRgDJW0A/kwh3MTu9yQY09zRw9tUd

Malware Config

Extracted

Family

redline

Botnet

@bbakoch

C2

37.1.213.214:63028

Targets

    • Target

      424ff83911ab4cab3ea0cd2e11731762_JaffaCakes118

    • Size

      432KB

    • MD5

      424ff83911ab4cab3ea0cd2e11731762

    • SHA1

      c02c4fc71918a134a141c29b79513738eb939aac

    • SHA256

      5e1e38c73cf7b0484b741b5826ddb0e968d630bec918925592dc51157e11757f

    • SHA512

      06b06d3c34ba9e14cdf238930717fc75609b8106b5e31568b64e8c18c23f00c4c284b110d145c4ef3d92754061b164e7892feb3c80be6b03b838055ca05c716d

    • SSDEEP

      6144:Y2jOyVRlhl/oD5b/gn0ACW03PYhtBT4TCgHMtOe0TLQ3nHIEJ9zgWzbcl9txCYAH:YcRgDJW0A/kwh3MTu9yQY09zRw9tUd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • System Binary Proxy Execution: Regsvcs/Regasm

      Abuse Regasm to proxy execution of malicious code.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks