General

  • Target

    JaffaCakes118_30ce43a0bfd9ea9192aa6df32035f8c1876d106ec369256a04c1bc0fa6b3dadb

  • Size

    5.7MB

  • Sample

    241224-ae58hswmdn

  • MD5

    96bf1f270e62432b7978bbc8c6b22620

  • SHA1

    b4026de8abb90cf80766db002169dd4f08c659c4

  • SHA256

    2193f3f8bc4456eac49879d02edf997c4e1f991dae589a01380325d37973333e

  • SHA512

    2454e7a32266c8c6c016e4e8af68a6c763804a5d9f090cdbdde20ccca493a8bd5d6811ef6d06d248b45905d8d752fb1a67121bcd6fa0fb8e7bf21495dabe17e7

  • SSDEEP

    98304:ghjRasOvF9gO3VQZHhZpZo3mzP2KZbYIyE4bTPv4Dv5gwb1CXSNzdgGESk0TETLG:cOvD3VFuOKWIyEYLvWvv4XC5vdTETLG

Malware Config

Extracted

Family

redline

Botnet

1

C2

62.204.41.177:9425

Attributes
  • auth_value

    2c239ad7c28c8eab1f9626557bb9457a

Targets

    • Target

      DATA PROTECTION/advapi32.dll

    • Size

      5.0MB

    • MD5

      d48228f84026860e433cbd772cd269e4

    • SHA1

      a443b36bb2a7e9757d7ad472cdd1874f2d443f5c

    • SHA256

      7307679512d2fb0a712dd5174c693027b822833797db2d69cfd7b97aadc6107b

    • SHA512

      50fa851213637518833ed62f7696f1222f67ecb1f9ae8944f149e1e6a29a281a7fd0a09bca605f00e9db651ab2cd4e972e6726edf360d62708df6ebb2b3027eb

    • SSDEEP

      49152:Ec/1fiCPCsPaoQMVThpcbYFo0DCZGEGb/jh+w5De8kzVb:EKQz0NCZIV54

    Score
    1/10
    • Target

      DATA PROTECTION/combase.dll

    • Size

      2.1MB

    • MD5

      65441ddd17d8f99b37b9716412415940

    • SHA1

      23aaaec781f3f81bbb65470944c060e973b6e995

    • SHA256

      c5a6f11a839ad1e46983ddbef1f697e17e1f64ba80d388f6d7392461ddd90a9e

    • SHA512

      e04496ce8373021a586f31abffcbad46d159a3e70ac06c57416be7c413a7d7a93d12d7777e068a1575156699c2fd6ca1e53a40ba6d61f9137dfa62c720aacb69

    • SSDEEP

      49152:qYbdzuV9mMWdJKyzaBUPQ/MQ+emp+jhS6o:q8IydJzzgaX9p+u

    Score
    1/10
    • Target

      DATA PROTECTION/freebl3.dll

    • Size

      741KB

    • MD5

      f70594c50cfdddcb73690f9fa3d79f37

    • SHA1

      290157ea262756a5c9bafc8bbba46d6a9a0c9d10

    • SHA256

      8bb27eeb3481cf8e13d27c5599176e80976231d6b1b9c956af121740d3839858

    • SHA512

      3f6dc0582ec99d4d05ed6dbe47111e123858e404e3a78891c6593ce582578632cf717ce2cb4010297130fd0cdf297f7923429c37498945df765b51ec086dde14

    • SSDEEP

      12288:IP+3NkvK0MwtS2ZZELO173ycCZ0Kt3FjjwRwlbwgUfZmLqnhw:IPmkPMwtYLi7ycCZ0KNFjjwRwlcrfS+K

    Score
    1/10
    • Target

      Video.mp4.scr

    • Size

      700.0MB

    • MD5

      403fc6029a35c21a7d31d657cec40f0a

    • SHA1

      f669ea4ffe545d76eb329dfd10e3fe6145e0950d

    • SHA256

      30ce43a0bfd9ea9192aa6df32035f8c1876d106ec369256a04c1bc0fa6b3dadb

    • SHA512

      37aaeb0390e7dfed9d7976847a84a9656a95472a0f891e0a6a541d691c895852821533f6b8865acb0e170d67aad0e5b6c5bfaa87799391b82350acb3df9c8843

    • SSDEEP

      24576:Zeacs1vXtGBWz5cbwkNixCT3Mb9rmnibyQUlp:1csZsTb3ixs+mn6ypp

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks