General

  • Target

    a8c32d32b6c010a9a178f7125ff09a8f_JaffaCakes118

  • Size

    370KB

  • Sample

    241127-t8hh4axqem

  • MD5

    a8c32d32b6c010a9a178f7125ff09a8f

  • SHA1

    54d544dff189537a99a17a3b27a9c0e869aa6cdc

  • SHA256

    2e0b1b8b6c0f6a512152d19c53bc7690aa7a5c06e4cdd60f46c24b93972d8fec

  • SHA512

    8f8af8be86569d0ba406141f969ba24643c092b72baec9b9c098a88c8a32f51013317293d25fb38b3676cbba60c2445305bb4ba5a968fec1eb6fa5531b2a7702

  • SSDEEP

    6144:pIM4Ry8Lv3KaD3EfB1tSvI7pTs3O8U7Caok2PM:yM4Emv3KaD3EfB1tSvI7pTs3O8U7CaoL

Malware Config

Extracted

Family

redline

C2

45.138.72.167:25882

Targets

    • Target

      a8c32d32b6c010a9a178f7125ff09a8f_JaffaCakes118

    • Size

      370KB

    • MD5

      a8c32d32b6c010a9a178f7125ff09a8f

    • SHA1

      54d544dff189537a99a17a3b27a9c0e869aa6cdc

    • SHA256

      2e0b1b8b6c0f6a512152d19c53bc7690aa7a5c06e4cdd60f46c24b93972d8fec

    • SHA512

      8f8af8be86569d0ba406141f969ba24643c092b72baec9b9c098a88c8a32f51013317293d25fb38b3676cbba60c2445305bb4ba5a968fec1eb6fa5531b2a7702

    • SSDEEP

      6144:pIM4Ry8Lv3KaD3EfB1tSvI7pTs3O8U7Caok2PM:yM4Emv3KaD3EfB1tSvI7pTs3O8U7CaoL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks