General
-
Target
dda761f784da71fb49d313a4e67f6f16_JaffaCakes118
-
Size
2.0MB
-
Sample
241210-jat45atmej
-
MD5
dda761f784da71fb49d313a4e67f6f16
-
SHA1
907465151e20d438c54337548086f910c9ae5f6f
-
SHA256
6771fffbde6927eaa93f84d400a7dc61d17442193e40544f015227495f39c84c
-
SHA512
e9a93bac4e56f9d1cbe3ce6d506d645a9a6ac2c7ba471466972afdc16fa05d33f26fdd40b0d19bfc5b174c34c09a4d395eba1ea52907b67ac05009b069e42f32
-
SSDEEP
49152:CzK6IbF8Md2eJYJPjPeANSwbK27PS/00IR99t9Skgq:16Md2eYdp7PSc0IbIkgq
Static task
static1
Behavioral task
behavioral1
Sample
dda761f784da71fb49d313a4e67f6f16_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dda761f784da71fb49d313a4e67f6f16_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
135.181.170.169:36855
Targets
-
-
Target
dda761f784da71fb49d313a4e67f6f16_JaffaCakes118
-
Size
2.0MB
-
MD5
dda761f784da71fb49d313a4e67f6f16
-
SHA1
907465151e20d438c54337548086f910c9ae5f6f
-
SHA256
6771fffbde6927eaa93f84d400a7dc61d17442193e40544f015227495f39c84c
-
SHA512
e9a93bac4e56f9d1cbe3ce6d506d645a9a6ac2c7ba471466972afdc16fa05d33f26fdd40b0d19bfc5b174c34c09a4d395eba1ea52907b67ac05009b069e42f32
-
SSDEEP
49152:CzK6IbF8Md2eJYJPjPeANSwbK27PS/00IR99t9Skgq:16Md2eYdp7PSc0IbIkgq
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-