General

  • Target

    c6dad11b8e9f10c96cd2517e7fe4607e_JaffaCakes118

  • Size

    497KB

  • Sample

    241205-klzdnawrfz

  • MD5

    c6dad11b8e9f10c96cd2517e7fe4607e

  • SHA1

    85896e64c86495154ce6951854edc5a30b6e05c5

  • SHA256

    893c426e68958739f214976cb403cb04ff21d8da83657efd3e73be6296d4de41

  • SHA512

    1f64bf9fb4dd38870b855b591cd54bc612ad127fffecc2c17bae0d3c186e3ed92901e9741f97bdb37d4732f5fdbdf9293c03c2e8b8ba31896706bf55cac82f32

  • SSDEEP

    12288:ZQl9XIjHtrPs5brmEK8xwax6PN835xdqme1cPDk8+AqJDPRKcnaEC84jzlSi3AWc:opIjHBubrz3H6s5xdqme1

Malware Config

Extracted

Family

redline

Botnet

@kakyoinnoriakki

C2

92.119.113.189:21746

Targets

    • Target

      c6dad11b8e9f10c96cd2517e7fe4607e_JaffaCakes118

    • Size

      497KB

    • MD5

      c6dad11b8e9f10c96cd2517e7fe4607e

    • SHA1

      85896e64c86495154ce6951854edc5a30b6e05c5

    • SHA256

      893c426e68958739f214976cb403cb04ff21d8da83657efd3e73be6296d4de41

    • SHA512

      1f64bf9fb4dd38870b855b591cd54bc612ad127fffecc2c17bae0d3c186e3ed92901e9741f97bdb37d4732f5fdbdf9293c03c2e8b8ba31896706bf55cac82f32

    • SSDEEP

      12288:ZQl9XIjHtrPs5brmEK8xwax6PN835xdqme1cPDk8+AqJDPRKcnaEC84jzlSi3AWc:opIjHBubrz3H6s5xdqme1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks