General

  • Target

    96ac2f219fe70881ab1ec3c46e265c8e_JaffaCakes118

  • Size

    917KB

  • Sample

    241124-xv98qs1jaj

  • MD5

    96ac2f219fe70881ab1ec3c46e265c8e

  • SHA1

    03c2d3278e7f68f130b6ed19f246b0a4c3dffeea

  • SHA256

    028f61ad8e9b25442c11a1b28251e9630df45263db86a0a14950b1edb3809cf6

  • SHA512

    c8263cb91402d2aff476821634478c4a54fbfc68738e3d0d731aee0488c8a661ea9e2d4de54403a34b7965cea794c9c7a6dd51ebfe2bcb354bcf9307217ed98a

  • SSDEEP

    12288:1DdxdoxZzXr6aNBo/udHK7z07+KRFE1PAr/IAKFnE2XVe42Q744ynQVCtWT:1lkxXVN+VwSPAjCF/Fe42s4JcC0T

Malware Config

Extracted

Family

redline

Botnet

mainstub23

C2

qusenero.xyz:80

Targets

    • Target

      96ac2f219fe70881ab1ec3c46e265c8e_JaffaCakes118

    • Size

      917KB

    • MD5

      96ac2f219fe70881ab1ec3c46e265c8e

    • SHA1

      03c2d3278e7f68f130b6ed19f246b0a4c3dffeea

    • SHA256

      028f61ad8e9b25442c11a1b28251e9630df45263db86a0a14950b1edb3809cf6

    • SHA512

      c8263cb91402d2aff476821634478c4a54fbfc68738e3d0d731aee0488c8a661ea9e2d4de54403a34b7965cea794c9c7a6dd51ebfe2bcb354bcf9307217ed98a

    • SSDEEP

      12288:1DdxdoxZzXr6aNBo/udHK7z07+KRFE1PAr/IAKFnE2XVe42Q744ynQVCtWT:1lkxXVN+VwSPAjCF/Fe42s4JcC0T

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks