General
-
Target
fb015fe6c1551b024ee8fe4f18492a51_JaffaCakes118
-
Size
3.5MB
-
Sample
241218-lmm8fsvlcm
-
MD5
fb015fe6c1551b024ee8fe4f18492a51
-
SHA1
936a94e1f68932e6dc0fdb1679be244cea02d433
-
SHA256
c86afa2b7029bc231add8b0c749cfcfd4868112261c6d2a671a1de657ceef826
-
SHA512
3776e5fca598a837222e8a305f122e8ed97106a617249396a7b74e5c5893c5afcc16b3dc14898cfd291b466ca231a6ed1457549310dc85af6966bfe49cb414bc
-
SSDEEP
98304:FMhScWXHrOq3pE8vdcJJmxJEk5v1A1J7tA1u:/X1vdcqxX5v1A1J7tsu
Behavioral task
behavioral1
Sample
fb015fe6c1551b024ee8fe4f18492a51_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb015fe6c1551b024ee8fe4f18492a51_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
1761072566
91.142.79.35:13400
Targets
-
-
Target
fb015fe6c1551b024ee8fe4f18492a51_JaffaCakes118
-
Size
3.5MB
-
MD5
fb015fe6c1551b024ee8fe4f18492a51
-
SHA1
936a94e1f68932e6dc0fdb1679be244cea02d433
-
SHA256
c86afa2b7029bc231add8b0c749cfcfd4868112261c6d2a671a1de657ceef826
-
SHA512
3776e5fca598a837222e8a305f122e8ed97106a617249396a7b74e5c5893c5afcc16b3dc14898cfd291b466ca231a6ed1457549310dc85af6966bfe49cb414bc
-
SSDEEP
98304:FMhScWXHrOq3pE8vdcJJmxJEk5v1A1J7tA1u:/X1vdcqxX5v1A1J7tsu
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-