General
-
Target
6b8a56b74f1670c96876239a5ba07efd_JaffaCakes118
-
Size
3.8MB
-
Sample
241022-wjbqcsxdje
-
MD5
6b8a56b74f1670c96876239a5ba07efd
-
SHA1
48c92de72241356721ac1225e257c68e93cf0c83
-
SHA256
339ec36cbe6b30265a40f17065e4261d9d3f9ebb56399d0fbc9b3e0a40d6aa3d
-
SHA512
6754b384048fcb769622f7872f8cb813d79ce51dbdcb60297f833b5573e19709044361e9861fe09f557b7171402226af92d2b8362cd1b17740f31f755206b9a9
-
SSDEEP
49152:TgoEY1xSmTl3K20Mk2XVrkH2W+rvCRgcuO2aZzJLskIw5BUgGRc:sVYjTtKQXy2rD0gcuO2C4kv56k
Behavioral task
behavioral1
Sample
6b8a56b74f1670c96876239a5ba07efd_JaffaCakes118.exe
Resource
win7-20240729-en
Malware Config
Extracted
redline
lolka2020
194.87.95.28:37026
Targets
-
-
Target
6b8a56b74f1670c96876239a5ba07efd_JaffaCakes118
-
Size
3.8MB
-
MD5
6b8a56b74f1670c96876239a5ba07efd
-
SHA1
48c92de72241356721ac1225e257c68e93cf0c83
-
SHA256
339ec36cbe6b30265a40f17065e4261d9d3f9ebb56399d0fbc9b3e0a40d6aa3d
-
SHA512
6754b384048fcb769622f7872f8cb813d79ce51dbdcb60297f833b5573e19709044361e9861fe09f557b7171402226af92d2b8362cd1b17740f31f755206b9a9
-
SSDEEP
49152:TgoEY1xSmTl3K20Mk2XVrkH2W+rvCRgcuO2aZzJLskIw5BUgGRc:sVYjTtKQXy2rD0gcuO2C4kv56k
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-