General

  • Target

    acfdc8eb1511626b94b14063b957b613_JaffaCakes118

  • Size

    296KB

  • Sample

    241128-vddr4ayqbm

  • MD5

    acfdc8eb1511626b94b14063b957b613

  • SHA1

    98cab634f5a1db595b7f33b18f0af884e9385325

  • SHA256

    1edb999b5a5893c03a25194a97b6ee52d08b9979c248de41e7e4bafb160b377e

  • SHA512

    bd7c750ea5620d219c7b662de57eaaaadc7b713e80c3d7f2b3f545a17fdcf327268f966e8e6035f4c96b48fe11f1bb50285da5b3ca80aee1ba1633c8a406f5ae

  • SSDEEP

    6144:UAYFsFw3yv6TCtrI57u6afGErDmKDG49UUJ9HNAABm+rrka:Umm3yCQrINu6aHhGJUhjBTIa

Malware Config

Extracted

Family

redline

Botnet

@keynejkee

C2

164.132.72.186:18717

Targets

    • Target

      acfdc8eb1511626b94b14063b957b613_JaffaCakes118

    • Size

      296KB

    • MD5

      acfdc8eb1511626b94b14063b957b613

    • SHA1

      98cab634f5a1db595b7f33b18f0af884e9385325

    • SHA256

      1edb999b5a5893c03a25194a97b6ee52d08b9979c248de41e7e4bafb160b377e

    • SHA512

      bd7c750ea5620d219c7b662de57eaaaadc7b713e80c3d7f2b3f545a17fdcf327268f966e8e6035f4c96b48fe11f1bb50285da5b3ca80aee1ba1633c8a406f5ae

    • SSDEEP

      6144:UAYFsFw3yv6TCtrI57u6afGErDmKDG49UUJ9HNAABm+rrka:Umm3yCQrINu6aHhGJUhjBTIa

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks