Overview
overview
10Static
static
3a2662fb73b...18.exe
windows7-x64
10a2662fb73b...18.exe
windows10-2004-x64
10$APPDATA/R...er.exe
windows7-x64
6$APPDATA/R...er.exe
windows10-2004-x64
6$TEMP/KeyActivate.exe
windows7-x64
8$TEMP/KeyActivate.exe
windows10-2004-x64
8$TEMP/launcher.exe
windows7-x64
10$TEMP/launcher.exe
windows10-2004-x64
10General
-
Target
a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118
-
Size
1.0MB
-
Sample
241126-rmv6ysvkgw
-
MD5
a2662fb73bd4f01311cb33f20b72baca
-
SHA1
df62e36435f56799154bfcc1962a3e0a36769eec
-
SHA256
054ce7a68c5ef3e99d04df90781e6e084517e9499f62afef7f423d4d331e155d
-
SHA512
de09c6023a185525e29c0f3f19d00aa6c38b386cf3262827d245cac0d92f70f79f87d1d9c5c053fd490766a67feefdc33a0a474453624d535677a69ae421c357
-
SSDEEP
24576:XL2oFugO/TMRpV5n08Xcvpr+NOwZi3uv+:X6oJ1Rtn0Ll+Jyu2
Static task
static1
Behavioral task
behavioral1
Sample
a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$APPDATA/RuntimeBroker.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$APPDATA/RuntimeBroker.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/KeyActivate.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$TEMP/KeyActivate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$TEMP/launcher.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
@fx0321
193.56.8.53:25656
Targets
-
-
Target
a2662fb73bd4f01311cb33f20b72baca_JaffaCakes118
-
Size
1.0MB
-
MD5
a2662fb73bd4f01311cb33f20b72baca
-
SHA1
df62e36435f56799154bfcc1962a3e0a36769eec
-
SHA256
054ce7a68c5ef3e99d04df90781e6e084517e9499f62afef7f423d4d331e155d
-
SHA512
de09c6023a185525e29c0f3f19d00aa6c38b386cf3262827d245cac0d92f70f79f87d1d9c5c053fd490766a67feefdc33a0a474453624d535677a69ae421c357
-
SSDEEP
24576:XL2oFugO/TMRpV5n08Xcvpr+NOwZi3uv+:X6oJ1Rtn0Ll+Jyu2
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
$APPDATA/RuntimeBroker.exe
-
Size
58KB
-
MD5
411e7ed61ef7002096f3e3d2ce519734
-
SHA1
fdf8d29b4b310974477539fc35c3b3d327963c6c
-
SHA256
822c45c64e7c5e5781cc07933042ed274b13083ab32125efcd8d68cb33a899bc
-
SHA512
7500c26d1a3e6c3e318c48799c4adb35dfb8940daef7950a451fe78c6433cec057d4fdf4cc024e6e172568253056b869dec058f9b2d3c21e0a8c25001887bfe2
-
SSDEEP
768:nyVi4c//HcAtm3sMMX+KYlZT7IVHrzvR+g2ikZTn2vwE+WPkeicvKmfg7UbcKjb/:nDb8QD+KYlZToV+Yk/cimfu6cK37L
Score6/10-
Adds Run key to start application
-
-
-
Target
$TEMP/KeyActivate.exe
-
Size
569KB
-
MD5
9bb06ab42d4883d1315641b62dd65e58
-
SHA1
e58876178a5cfc69c62c6f72c06c6f34b3e4b821
-
SHA256
d1347ceaeb056a0ba1ceb2a674864c2b6123c5ec516d1de0d6f1b17653638474
-
SHA512
1ca41b28fa675c6b7f8efc9d5fa9e515324985e7715f0bca33c5e75ccf85845096cbc44688a0a7f6b1c73a807031ffe1814873b51559d56e9f608525250870c8
-
SSDEEP
6144:KtkWYHHmXrDcmnBQmt3xRdyaAqbvdPeaNx9MuxY+NdxCM2o:Kksrfe2vdTdPeoxeu1L2o
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
-
-
Target
$TEMP/launcher.exe
-
Size
416KB
-
MD5
3f4ced9fb30a8c31f129d5e717141171
-
SHA1
2e6cdc927bc9e17e8c3e3985e6dc783d2f359e55
-
SHA256
507640330eb0d338c68d640ed4c4a4fe0a87a6293bf57afa74cfbaea20dd019c
-
SHA512
01374beb7508b7ee962fdb4764cfce2a3b5902ebb92993f0359ede0363de905eea72c30ab1d80cc9e0f0771c8c95e5b3faa189703d948a2d87386eb9c0df0faf
-
SSDEEP
6144:PBpK6MVQSu3K1uKvpWN5jK0yijz4c4JSupenGWg2D1Zi3uIfik/NglFh:PBpKv6K0KvpWPK5i4cg+4OZi3uDkYF
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1