General

  • Target

    95f576a6fab1f271650f41306a73ccf4_JaffaCakes118

  • Size

    115KB

  • Sample

    241124-t9etlavndr

  • MD5

    95f576a6fab1f271650f41306a73ccf4

  • SHA1

    3101f46dba9c3b671523fcd9c067aa4a2912bb7d

  • SHA256

    5522dd43e239218077b330930effb48aed071c2345e7fca106d14d321b7cf87d

  • SHA512

    fc2911936d1b2055d861def6711e2f7938189830b43f9a8b3d6fb062f588ae258fc420dddfe4bbe492f61fcfe6bfa5d89901f36c243173174b1db4880ad31dad

  • SSDEEP

    1536:5ZlPUgQ07Km2APlPT66hfrQXXdBO/npYp78mGUnD5Kfxmo5g+uCwRiXHFMurEYX:5MgQ07KmHPZxUX6RY+mG2MpmDSmu

Malware Config

Extracted

Family

redline

Botnet

@rusthacksfordumbs

C2

51.254.69.209:48987

Targets

    • Target

      95f576a6fab1f271650f41306a73ccf4_JaffaCakes118

    • Size

      115KB

    • MD5

      95f576a6fab1f271650f41306a73ccf4

    • SHA1

      3101f46dba9c3b671523fcd9c067aa4a2912bb7d

    • SHA256

      5522dd43e239218077b330930effb48aed071c2345e7fca106d14d321b7cf87d

    • SHA512

      fc2911936d1b2055d861def6711e2f7938189830b43f9a8b3d6fb062f588ae258fc420dddfe4bbe492f61fcfe6bfa5d89901f36c243173174b1db4880ad31dad

    • SSDEEP

      1536:5ZlPUgQ07Km2APlPT66hfrQXXdBO/npYp78mGUnD5Kfxmo5g+uCwRiXHFMurEYX:5MgQ07KmHPZxUX6RY+mG2MpmDSmu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks