General

  • Target

    a8e15354ee16aae5eec64d0f2eac296d_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241127-vvlh9sypfn

  • MD5

    a8e15354ee16aae5eec64d0f2eac296d

  • SHA1

    e5a60bf87dd9aa2317abb6658dc470d9d85aad72

  • SHA256

    7d0a1169c881231d6a438eb1df2a653aa1b003ff5c0c57a2766353f82a6ab49a

  • SHA512

    7bca26ff62492b6846016e267595c4486259a48eb2737902719b02f866bf562191ed50453a5bc01b04d98e2bf64e07aff22945c5cac08d615a027e2f4ff1e97a

  • SSDEEP

    12288:FN40/S6FSwe5zzkXKWzpdOxtz5+tIZ14dufNyZLoY18p+Jh6KRLIrRuT7iXV4+Tx:iGji

Malware Config

Extracted

Family

redline

Botnet

rich

C2

95.217.248.44:11695

Targets

    • Target

      a8e15354ee16aae5eec64d0f2eac296d_JaffaCakes118

    • Size

      1.1MB

    • MD5

      a8e15354ee16aae5eec64d0f2eac296d

    • SHA1

      e5a60bf87dd9aa2317abb6658dc470d9d85aad72

    • SHA256

      7d0a1169c881231d6a438eb1df2a653aa1b003ff5c0c57a2766353f82a6ab49a

    • SHA512

      7bca26ff62492b6846016e267595c4486259a48eb2737902719b02f866bf562191ed50453a5bc01b04d98e2bf64e07aff22945c5cac08d615a027e2f4ff1e97a

    • SSDEEP

      12288:FN40/S6FSwe5zzkXKWzpdOxtz5+tIZ14dufNyZLoY18p+Jh6KRLIrRuT7iXV4+Tx:iGji

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks