General
-
Target
424ff83911ab4cab3ea0cd2e11731762_JaffaCakes118
-
Size
432KB
-
Sample
241013-1yhvfavgll
-
MD5
424ff83911ab4cab3ea0cd2e11731762
-
SHA1
c02c4fc71918a134a141c29b79513738eb939aac
-
SHA256
5e1e38c73cf7b0484b741b5826ddb0e968d630bec918925592dc51157e11757f
-
SHA512
06b06d3c34ba9e14cdf238930717fc75609b8106b5e31568b64e8c18c23f00c4c284b110d145c4ef3d92754061b164e7892feb3c80be6b03b838055ca05c716d
-
SSDEEP
6144:Y2jOyVRlhl/oD5b/gn0ACW03PYhtBT4TCgHMtOe0TLQ3nHIEJ9zgWzbcl9txCYAH:YcRgDJW0A/kwh3MTu9yQY09zRw9tUd
Static task
static1
Behavioral task
behavioral1
Sample
424ff83911ab4cab3ea0cd2e11731762_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
424ff83911ab4cab3ea0cd2e11731762_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
@bbakoch
37.1.213.214:63028
Targets
-
-
Target
424ff83911ab4cab3ea0cd2e11731762_JaffaCakes118
-
Size
432KB
-
MD5
424ff83911ab4cab3ea0cd2e11731762
-
SHA1
c02c4fc71918a134a141c29b79513738eb939aac
-
SHA256
5e1e38c73cf7b0484b741b5826ddb0e968d630bec918925592dc51157e11757f
-
SHA512
06b06d3c34ba9e14cdf238930717fc75609b8106b5e31568b64e8c18c23f00c4c284b110d145c4ef3d92754061b164e7892feb3c80be6b03b838055ca05c716d
-
SSDEEP
6144:Y2jOyVRlhl/oD5b/gn0ACW03PYhtBT4TCgHMtOe0TLQ3nHIEJ9zgWzbcl9txCYAH:YcRgDJW0A/kwh3MTu9yQY09zRw9tUd
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-