General

  • Target

    fb015fe6c1551b024ee8fe4f18492a51_JaffaCakes118

  • Size

    3.5MB

  • Sample

    241218-lmm8fsvlcm

  • MD5

    fb015fe6c1551b024ee8fe4f18492a51

  • SHA1

    936a94e1f68932e6dc0fdb1679be244cea02d433

  • SHA256

    c86afa2b7029bc231add8b0c749cfcfd4868112261c6d2a671a1de657ceef826

  • SHA512

    3776e5fca598a837222e8a305f122e8ed97106a617249396a7b74e5c5893c5afcc16b3dc14898cfd291b466ca231a6ed1457549310dc85af6966bfe49cb414bc

  • SSDEEP

    98304:FMhScWXHrOq3pE8vdcJJmxJEk5v1A1J7tA1u:/X1vdcqxX5v1A1J7tsu

Malware Config

Extracted

Family

redline

Botnet

1761072566

C2

91.142.79.35:13400

Targets

    • Target

      fb015fe6c1551b024ee8fe4f18492a51_JaffaCakes118

    • Size

      3.5MB

    • MD5

      fb015fe6c1551b024ee8fe4f18492a51

    • SHA1

      936a94e1f68932e6dc0fdb1679be244cea02d433

    • SHA256

      c86afa2b7029bc231add8b0c749cfcfd4868112261c6d2a671a1de657ceef826

    • SHA512

      3776e5fca598a837222e8a305f122e8ed97106a617249396a7b74e5c5893c5afcc16b3dc14898cfd291b466ca231a6ed1457549310dc85af6966bfe49cb414bc

    • SSDEEP

      98304:FMhScWXHrOq3pE8vdcJJmxJEk5v1A1J7tA1u:/X1vdcqxX5v1A1J7tsu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks