General

  • Target

    e0ed719f5cfb88cf8535b2eccb304091_JaffaCakes118

  • Size

    565KB

  • Sample

    241211-ly8crsslbp

  • MD5

    e0ed719f5cfb88cf8535b2eccb304091

  • SHA1

    37df1d9374b95208eeb849f201ec52a9ea2a1dc4

  • SHA256

    34a52412b78513c099240257aa12fb65cfaeed5f0dae9a70abda841e8f71a8d1

  • SHA512

    a31fb1f6a0129d8ccf88137019f3571ba45db1c46d6f3fcad50504dd001d8e24cad2cab0cbd93eb83889bda5e19460cd513d4c7409bac8cbbe02606f1a71ecd4

  • SSDEEP

    12288:QwPAN6Xz/apy723UP9q/QGXMBp1mctuvim0IzUjGL63Fjh9NE0EKl/Bylcf:vA6GYLP9tGXMpsigzS

Malware Config

Extracted

Family

redline

Botnet

@Krokz26

C2

185.80.234.77:17105

Targets

    • Target

      e0ed719f5cfb88cf8535b2eccb304091_JaffaCakes118

    • Size

      565KB

    • MD5

      e0ed719f5cfb88cf8535b2eccb304091

    • SHA1

      37df1d9374b95208eeb849f201ec52a9ea2a1dc4

    • SHA256

      34a52412b78513c099240257aa12fb65cfaeed5f0dae9a70abda841e8f71a8d1

    • SHA512

      a31fb1f6a0129d8ccf88137019f3571ba45db1c46d6f3fcad50504dd001d8e24cad2cab0cbd93eb83889bda5e19460cd513d4c7409bac8cbbe02606f1a71ecd4

    • SSDEEP

      12288:QwPAN6Xz/apy723UP9q/QGXMBp1mctuvim0IzUjGL63Fjh9NE0EKl/Bylcf:vA6GYLP9tGXMpsigzS

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks