General

  • Target

    c0804faa07ec7aef2aa886324690c18a_JaffaCakes118

  • Size

    375KB

  • Sample

    241204-dhagssykf1

  • MD5

    c0804faa07ec7aef2aa886324690c18a

  • SHA1

    c54628cb7060b4793cb39fb4cb2e65d2e55c5500

  • SHA256

    fc2f65df06a20c76080de447e08d8f40ba6dcddbbe1f370d900062a02c185981

  • SHA512

    ff5f62306b8f949d7e6f28254c46e20378dc681837c856b0b6844685d056db69577aee93ff07b467969404be705c36883b53fed1a2d3645c689be94805ad42ab

  • SSDEEP

    6144:eb9ZbOnbJHaMCyWzNbVRIiGFPp4ufj8E3OMzm1V/naL47U6NQrvA2FHc4E4Dpu15:6cJHqcVEV/aLroa3HcRUMDWtx99pSnkc

Malware Config

Extracted

Family

redline

Botnet

VJBJCZXQ

C2

188.34.176.164:80

Targets

    • Target

      c0804faa07ec7aef2aa886324690c18a_JaffaCakes118

    • Size

      375KB

    • MD5

      c0804faa07ec7aef2aa886324690c18a

    • SHA1

      c54628cb7060b4793cb39fb4cb2e65d2e55c5500

    • SHA256

      fc2f65df06a20c76080de447e08d8f40ba6dcddbbe1f370d900062a02c185981

    • SHA512

      ff5f62306b8f949d7e6f28254c46e20378dc681837c856b0b6844685d056db69577aee93ff07b467969404be705c36883b53fed1a2d3645c689be94805ad42ab

    • SSDEEP

      6144:eb9ZbOnbJHaMCyWzNbVRIiGFPp4ufj8E3OMzm1V/naL47U6NQrvA2FHc4E4Dpu15:6cJHqcVEV/aLroa3HcRUMDWtx99pSnkc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks