General
-
Target
a1ed011dcb51f6787c27f09124345fe9_JaffaCakes118
-
Size
563KB
-
Sample
241126-pmtl1sxmel
-
MD5
a1ed011dcb51f6787c27f09124345fe9
-
SHA1
7abf9da22e35d13a2ad6a7e7fcf5773bae016bd1
-
SHA256
7343b3706d03e104cdebd561ec441807a5424d4b48778a1396388c654a5e123c
-
SHA512
ab3efddb8b9d15f8e0f63064f3e94d3cb72cb2cd1ceaf2479a4cd42c6a30cb378d97fc8c40d8e6c3a55fccff3d11d30aa81b1b9010cec533ec13acb187cff762
-
SSDEEP
6144:+++4fSzkNDYb+iuD6eQpSdYtYZsoL6EAwKM8TE/2H9:O4GysbluueaSatYZGMw1H9
Static task
static1
Behavioral task
behavioral1
Sample
a1ed011dcb51f6787c27f09124345fe9_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
redline
22
GAMELABPRO.CLUB:80
Targets
-
-
Target
a1ed011dcb51f6787c27f09124345fe9_JaffaCakes118
-
Size
563KB
-
MD5
a1ed011dcb51f6787c27f09124345fe9
-
SHA1
7abf9da22e35d13a2ad6a7e7fcf5773bae016bd1
-
SHA256
7343b3706d03e104cdebd561ec441807a5424d4b48778a1396388c654a5e123c
-
SHA512
ab3efddb8b9d15f8e0f63064f3e94d3cb72cb2cd1ceaf2479a4cd42c6a30cb378d97fc8c40d8e6c3a55fccff3d11d30aa81b1b9010cec533ec13acb187cff762
-
SSDEEP
6144:+++4fSzkNDYb+iuD6eQpSdYtYZsoL6EAwKM8TE/2H9:O4GysbluueaSatYZGMw1H9
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of SetThreadContext
-