Analysis
-
max time kernel
154s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 11:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3be046eecb8b4cbcf667ffcae447b5be3039638d1e41ccdad95795b185219f98.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3be046eecb8b4cbcf667ffcae447b5be3039638d1e41ccdad95795b185219f98.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3be046eecb8b4cbcf667ffcae447b5be3039638d1e41ccdad95795b185219f98.exe
-
Size
721.4MB
-
MD5
1eeea22e7fb6ac049baa0ef4bc304831
-
SHA1
47e6b0373f583826540da199ea776904d3a4d179
-
SHA256
3be046eecb8b4cbcf667ffcae447b5be3039638d1e41ccdad95795b185219f98
-
SHA512
ad9a64bca8d1469e587b556ce3b986a78f73bc93c0ecc36049c79cb35429d525e6e9fe38e96d626e3d1544e4fa85523714018e06c635954bc85e14bdf3e3f88f
-
SSDEEP
3072:KZjod0nQkDcnycVJQiqCyCcwgkpKqiCY8+QlTyh:Uj/hUJSvqxl
Malware Config
Extracted
redline
5527589964_99
https://pastebin.com/raw/tnW31tPp
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4832-2-0x00000000001C0000-0x00000000001DE000-memory.dmp family_redline -
Redline family
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 203 pastebin.com 372 pastebin.com 377 pastebin.com 472 pastebin.com 143 pastebin.com 164 pastebin.com 402 pastebin.com 302 pastebin.com 374 pastebin.com 404 pastebin.com 480 pastebin.com 529 pastebin.com 244 pastebin.com 352 pastebin.com 381 pastebin.com 433 pastebin.com 465 pastebin.com 487 pastebin.com 28 pastebin.com 262 pastebin.com 146 pastebin.com 212 pastebin.com 160 pastebin.com 27 pastebin.com 154 pastebin.com 470 pastebin.com 378 pastebin.com 456 pastebin.com 493 pastebin.com 264 pastebin.com 317 pastebin.com 283 pastebin.com 318 pastebin.com 426 pastebin.com 178 pastebin.com 233 pastebin.com 308 pastebin.com 362 pastebin.com 384 pastebin.com 507 pastebin.com 42 pastebin.com 157 pastebin.com 294 pastebin.com 240 pastebin.com 241 pastebin.com 297 pastebin.com 301 pastebin.com 417 pastebin.com 26 pastebin.com 239 pastebin.com 546 pastebin.com 281 pastebin.com 485 pastebin.com 32 pastebin.com 153 pastebin.com 268 pastebin.com 172 pastebin.com 222 pastebin.com 287 pastebin.com 311 pastebin.com 475 pastebin.com 509 pastebin.com 24 pastebin.com 122 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3be046eecb8b4cbcf667ffcae447b5be3039638d1e41ccdad95795b185219f98.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4832 JaffaCakes118_3be046eecb8b4cbcf667ffcae447b5be3039638d1e41ccdad95795b185219f98.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be046eecb8b4cbcf667ffcae447b5be3039638d1e41ccdad95795b185219f98.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be046eecb8b4cbcf667ffcae447b5be3039638d1e41ccdad95795b185219f98.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4832