General

  • Target

    8aa3dd27e5aab7039f975ec54219a53f_JaffaCakes118

  • Size

    3.8MB

  • Sample

    241103-kxk1eazgka

  • MD5

    8aa3dd27e5aab7039f975ec54219a53f

  • SHA1

    99275e68dcfc187d1784a67d2811885ce1286431

  • SHA256

    ac0dab846ee64143046cf13afd4c2c2ddc5876409809bf9e03092ed75c80e7b7

  • SHA512

    0ffbe8142706a0d39d6eebd4d7ddb63ca7f05d876b96aee493673b36f7c2cdef9ecf7c1faca4abff551720b1d2c8a630b6cd3916de5bdf99a827f2a67a00c222

  • SSDEEP

    49152:G49EPufPP8y8qZbC64+08Tkl7bBCznvH0H456SKKpUrgCJSYgBzun:G40YPPFBC64+0amBCzvS6ZEgCYBza

Malware Config

Extracted

Family

redline

Botnet

killerakame1

C2

194.87.95.28:37026

Targets

    • Target

      8aa3dd27e5aab7039f975ec54219a53f_JaffaCakes118

    • Size

      3.8MB

    • MD5

      8aa3dd27e5aab7039f975ec54219a53f

    • SHA1

      99275e68dcfc187d1784a67d2811885ce1286431

    • SHA256

      ac0dab846ee64143046cf13afd4c2c2ddc5876409809bf9e03092ed75c80e7b7

    • SHA512

      0ffbe8142706a0d39d6eebd4d7ddb63ca7f05d876b96aee493673b36f7c2cdef9ecf7c1faca4abff551720b1d2c8a630b6cd3916de5bdf99a827f2a67a00c222

    • SSDEEP

      49152:G49EPufPP8y8qZbC64+08Tkl7bBCznvH0H456SKKpUrgCJSYgBzun:G40YPPFBC64+0amBCzvS6ZEgCYBza

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks