General

  • Target

    8ffb7d740c246cbc24e5197f45baae16_JaffaCakes118

  • Size

    514KB

  • Sample

    241123-w4emrawpal

  • MD5

    8ffb7d740c246cbc24e5197f45baae16

  • SHA1

    744af4c77d935e3c6aa0bdd07f8d88d053a914f7

  • SHA256

    047f4ef01f5e1a935036aca4088f41f79427bd9c889f3697941db2903ed301dd

  • SHA512

    1ad9c39643e2c0d21737d9e546933d925cfea2ae5fca2bcd4cec447346d81d38ecea135669c36c81e5a796ae27dd6cfd6dabaa081c87e192aa40e880fdb17935

  • SSDEEP

    6144:Dzix0B60EiFvFh/4m7uPdli4LoOlVE+efAb7nC0WEG05iT9W:Dzix0Y0E07u1A4Hj95EW

Malware Config

Extracted

Family

redline

Botnet

boss6

C2

109.248.201.150:63757

Targets

    • Target

      8ffb7d740c246cbc24e5197f45baae16_JaffaCakes118

    • Size

      514KB

    • MD5

      8ffb7d740c246cbc24e5197f45baae16

    • SHA1

      744af4c77d935e3c6aa0bdd07f8d88d053a914f7

    • SHA256

      047f4ef01f5e1a935036aca4088f41f79427bd9c889f3697941db2903ed301dd

    • SHA512

      1ad9c39643e2c0d21737d9e546933d925cfea2ae5fca2bcd4cec447346d81d38ecea135669c36c81e5a796ae27dd6cfd6dabaa081c87e192aa40e880fdb17935

    • SSDEEP

      6144:Dzix0B60EiFvFh/4m7uPdli4LoOlVE+efAb7nC0WEG05iT9W:Dzix0Y0E07u1A4Hj95EW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks