General

  • Target

    e4da67e0a0e594826549e34016967cc9_JaffaCakes118

  • Size

    352KB

  • Sample

    241212-fwbm5a1rfy

  • MD5

    e4da67e0a0e594826549e34016967cc9

  • SHA1

    3a0aa11e90d01dd9d9a95b159b99afad79a79310

  • SHA256

    ebc99f23d2b63ae33e4d7d5324d25c5967e6ce26e35f12a841114ba89728a28b

  • SHA512

    967ff61c47b5f3ccb41aa6a9fa1dc95794b46c2296762bee6e8934c7913446d14e125d476198f63818d93c49eabb264caef847bb2e8e22e0f842be604a8f7381

  • SSDEEP

    6144:AXITygJSuMgxFUr4yMXIrQR017XAQS0bsKk9u8iGhkXyJH4UOQnh40GYQqEDWT:A4TyS/FUMyMXIkk/8duXyZ4UO84oCDWT

Malware Config

Extracted

Family

redline

Botnet

usacash

C2

185.53.46.25:38743

Targets

    • Target

      e4da67e0a0e594826549e34016967cc9_JaffaCakes118

    • Size

      352KB

    • MD5

      e4da67e0a0e594826549e34016967cc9

    • SHA1

      3a0aa11e90d01dd9d9a95b159b99afad79a79310

    • SHA256

      ebc99f23d2b63ae33e4d7d5324d25c5967e6ce26e35f12a841114ba89728a28b

    • SHA512

      967ff61c47b5f3ccb41aa6a9fa1dc95794b46c2296762bee6e8934c7913446d14e125d476198f63818d93c49eabb264caef847bb2e8e22e0f842be604a8f7381

    • SSDEEP

      6144:AXITygJSuMgxFUr4yMXIrQR017XAQS0bsKk9u8iGhkXyJH4UOQnh40GYQqEDWT:A4TyS/FUMyMXIkk/8duXyZ4UO84oCDWT

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks