General
-
Target
4a062d6bc6c5351a43f344cb9d74f431_JaffaCakes118
-
Size
480KB
-
Sample
241015-z1vrcaxcpd
-
MD5
4a062d6bc6c5351a43f344cb9d74f431
-
SHA1
447cf28435fab3837f17e5ae0e11cc46903effb5
-
SHA256
68737920e984a0fd9e9d13c19bbd02474987bbb5bf2fab4e840d944d05f39e39
-
SHA512
1897f19b202ed97f23b88dc0461631ff65f8951496fcd12bcf9910e42ef93c94d9f62d432c1269a2a08f0ec0ca0e29ebc173d4211ecd4691be03b9e493f0b5e5
-
SSDEEP
6144:cigZeYtTdaVa7pOJSWD1q9oJa7x54hwGZjSNSkiSK6GSlg1OABTRcAz:cigZDJN3WD1Fk5ghSNSki1Slg8ALcAz
Static task
static1
Behavioral task
behavioral1
Sample
4a062d6bc6c5351a43f344cb9d74f431_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4a062d6bc6c5351a43f344cb9d74f431_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
@b0nomi
45.14.12.90:52072
Targets
-
-
Target
4a062d6bc6c5351a43f344cb9d74f431_JaffaCakes118
-
Size
480KB
-
MD5
4a062d6bc6c5351a43f344cb9d74f431
-
SHA1
447cf28435fab3837f17e5ae0e11cc46903effb5
-
SHA256
68737920e984a0fd9e9d13c19bbd02474987bbb5bf2fab4e840d944d05f39e39
-
SHA512
1897f19b202ed97f23b88dc0461631ff65f8951496fcd12bcf9910e42ef93c94d9f62d432c1269a2a08f0ec0ca0e29ebc173d4211ecd4691be03b9e493f0b5e5
-
SSDEEP
6144:cigZeYtTdaVa7pOJSWD1q9oJa7x54hwGZjSNSkiSK6GSlg1OABTRcAz:cigZDJN3WD1Fk5ghSNSki1Slg8ALcAz
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
SectopRAT payload
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-