General

  • Target

    c3fc79802e0066c4ac109f05deb7ed2b_JaffaCakes118

  • Size

    976KB

  • Sample

    241204-xvrrdswpfy

  • MD5

    c3fc79802e0066c4ac109f05deb7ed2b

  • SHA1

    ca00e8fcdba699aed87142ba36661f46d42a2d92

  • SHA256

    2c61f41bfea24a73e92557137ad17644e4a5fb6097b47667f9c46ac4de1bd09d

  • SHA512

    be47f12393023e0a92fb6097ee2b19eaa3979476df9440169f140b2c01e9c7aa78a277a6e11a1b81c4faf16702831735753303773e7c38370e92d4d64eda3e5a

  • SSDEEP

    24576:Fp0a41sZb77n6Zv40QIi4BMvZqU13/Ya2Qq/OJBCoHMCbThaLkM:AfdgpMcTsGhYkM

Malware Config

Extracted

Family

redline

Botnet

@Ant0nPavlov

C2

5.188.118.163:63275

Targets

    • Target

      c3fc79802e0066c4ac109f05deb7ed2b_JaffaCakes118

    • Size

      976KB

    • MD5

      c3fc79802e0066c4ac109f05deb7ed2b

    • SHA1

      ca00e8fcdba699aed87142ba36661f46d42a2d92

    • SHA256

      2c61f41bfea24a73e92557137ad17644e4a5fb6097b47667f9c46ac4de1bd09d

    • SHA512

      be47f12393023e0a92fb6097ee2b19eaa3979476df9440169f140b2c01e9c7aa78a277a6e11a1b81c4faf16702831735753303773e7c38370e92d4d64eda3e5a

    • SSDEEP

      24576:Fp0a41sZb77n6Zv40QIi4BMvZqU13/Ya2Qq/OJBCoHMCbThaLkM:AfdgpMcTsGhYkM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks