General

  • Target

    7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118

  • Size

    18.6MB

  • Sample

    241023-x513tawdka

  • MD5

    7076117f0c6d84ffd59192a4b1e7208f

  • SHA1

    08b793fc796ea5ef45f5a0d3ca989d2a2852a279

  • SHA256

    621d9de231168a4edd7b0d2bfb27f24165a1996c7a540e51fa31317a506a6518

  • SHA512

    b4f30483d16a6a38afedb91bba320e051be8a0ea94ed0e23c33f4fe0828d0ff08d8a0663aea6b2c5945b9649605217722037d2d214c3167d99fc90310160ff9a

  • SSDEEP

    393216:bsPcjinkzVPjpLnWsDkCSDCe0nz5QVIGKXTpchSpMtm9LZ0+ecQwX:bgFn0DLnC0zuuGKjpch4++em

Malware Config

Extracted

Family

redline

Botnet

Main

C2

146.0.75.231:65371

Targets

    • Target

      7076117f0c6d84ffd59192a4b1e7208f_JaffaCakes118

    • Size

      18.6MB

    • MD5

      7076117f0c6d84ffd59192a4b1e7208f

    • SHA1

      08b793fc796ea5ef45f5a0d3ca989d2a2852a279

    • SHA256

      621d9de231168a4edd7b0d2bfb27f24165a1996c7a540e51fa31317a506a6518

    • SHA512

      b4f30483d16a6a38afedb91bba320e051be8a0ea94ed0e23c33f4fe0828d0ff08d8a0663aea6b2c5945b9649605217722037d2d214c3167d99fc90310160ff9a

    • SSDEEP

      393216:bsPcjinkzVPjpLnWsDkCSDCe0nz5QVIGKXTpchSpMtm9LZ0+ecQwX:bgFn0DLnC0zuuGKjpch4++em

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • UAC bypass

    • Looks for VirtualBox Guest Additions in registry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Download via BitsAdmin

    • Drops file in Drivers directory

    • Looks for VMWare Tools registry key

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks