General

  • Target

    a07be23e856c005dd533c7ea4633961f_JaffaCakes118

  • Size

    246KB

  • Sample

    241126-htqelsznew

  • MD5

    a07be23e856c005dd533c7ea4633961f

  • SHA1

    17647c75e4dacf8564b251ea86c9f3f6a3348a30

  • SHA256

    c52660c8725d31fa4af36cda848daf492bcb13da231111c9fb96886aba6a5c9e

  • SHA512

    fa1fd71323d31718c73b15e7446f0cd9fa7b59ae73146fab4253cff6fc3e1275225396899310be1d6043a4e0cbcc98289617cc431fe63af09f838b33892ad6a5

  • SSDEEP

    6144:PIkKCsdCf3H+An9RBGJKKccmSHNN/aFD35/n7Y14tWTeeWN:PIq3PeqBGJ9HNNcD3x724theW

Malware Config

Extracted

Family

redline

Botnet

TomReddle

C2

194.226.139.70:31846

Extracted

Family

redline

Botnet

ytbirzha

C2

46.8.19.196:53773

Targets

    • Target

      a07be23e856c005dd533c7ea4633961f_JaffaCakes118

    • Size

      246KB

    • MD5

      a07be23e856c005dd533c7ea4633961f

    • SHA1

      17647c75e4dacf8564b251ea86c9f3f6a3348a30

    • SHA256

      c52660c8725d31fa4af36cda848daf492bcb13da231111c9fb96886aba6a5c9e

    • SHA512

      fa1fd71323d31718c73b15e7446f0cd9fa7b59ae73146fab4253cff6fc3e1275225396899310be1d6043a4e0cbcc98289617cc431fe63af09f838b33892ad6a5

    • SSDEEP

      6144:PIkKCsdCf3H+An9RBGJKKccmSHNN/aFD35/n7Y14tWTeeWN:PIq3PeqBGJ9HNNcD3x724theW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks