General

  • Target

    7323afbe0d446955ce3f207c285e20fd_JaffaCakes118

  • Size

    401KB

  • Sample

    241024-lhr1va1fjf

  • MD5

    7323afbe0d446955ce3f207c285e20fd

  • SHA1

    ca376c2908994781a3487ea3738ce003941f6933

  • SHA256

    d0614f772e5c669fdb8f81f443c6a9b687db141cf8af3d2f3c63f738492af704

  • SHA512

    bd062032da20a2792b0008514ca0cb0956e6888afe932430c1886f6165e8bb5c15de72d8b2efc3699827dee10102f7f8fb2e1076b0bf13a05ba24f6084ccafc4

  • SSDEEP

    6144:+2rZLBafYDmLofvWTHxFjV8YGjWzCV9qkwm+KqJL6xGOOhxxdeTr/ekI0su:XZdbmKeTTH9q9qkwnL6yzxd6LDsu

Malware Config

Extracted

Family

redline

Botnet

2

C2

80.87.192.249:16640

Targets

    • Target

      7323afbe0d446955ce3f207c285e20fd_JaffaCakes118

    • Size

      401KB

    • MD5

      7323afbe0d446955ce3f207c285e20fd

    • SHA1

      ca376c2908994781a3487ea3738ce003941f6933

    • SHA256

      d0614f772e5c669fdb8f81f443c6a9b687db141cf8af3d2f3c63f738492af704

    • SHA512

      bd062032da20a2792b0008514ca0cb0956e6888afe932430c1886f6165e8bb5c15de72d8b2efc3699827dee10102f7f8fb2e1076b0bf13a05ba24f6084ccafc4

    • SSDEEP

      6144:+2rZLBafYDmLofvWTHxFjV8YGjWzCV9qkwm+KqJL6xGOOhxxdeTr/ekI0su:XZdbmKeTTH9q9qkwnL6yzxd6LDsu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks