General
-
Target
43dba0e8a383863fc63b8a70d87bfba6_JaffaCakes118
-
Size
804KB
-
Sample
241014-ycpdzswfmp
-
MD5
43dba0e8a383863fc63b8a70d87bfba6
-
SHA1
02d43ae8b5fa933f34ff3e0686a93fa207d41056
-
SHA256
a8c01f337163dc0e0bccb3a85bd0bdca149a199e2d879771e05037ed00c8e967
-
SHA512
4ca15be07019051b26c2ea4d9562d90a53ee6ebb6b2ec9b93c4e24a5c2e6c20b884d866d09f17d2eaa6d004874f054e4350c7ea4c2b7331154b554edd780591c
-
SSDEEP
12288:WiG/HK7zc2w67doBnvGuCVg+4JVkjzCcDRCQx2gLFEU6LyD9SiyyjK:34b656euChyV+CcRj0EFERGd8
Static task
static1
Behavioral task
behavioral1
Sample
43dba0e8a383863fc63b8a70d87bfba6_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
anything
elired957.duckdns.org:15808
Targets
-
-
Target
43dba0e8a383863fc63b8a70d87bfba6_JaffaCakes118
-
Size
804KB
-
MD5
43dba0e8a383863fc63b8a70d87bfba6
-
SHA1
02d43ae8b5fa933f34ff3e0686a93fa207d41056
-
SHA256
a8c01f337163dc0e0bccb3a85bd0bdca149a199e2d879771e05037ed00c8e967
-
SHA512
4ca15be07019051b26c2ea4d9562d90a53ee6ebb6b2ec9b93c4e24a5c2e6c20b884d866d09f17d2eaa6d004874f054e4350c7ea4c2b7331154b554edd780591c
-
SSDEEP
12288:WiG/HK7zc2w67doBnvGuCVg+4JVkjzCcDRCQx2gLFEU6LyD9SiyyjK:34b656euChyV+CcRj0EFERGd8
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
Suspicious use of SetThreadContext
-