General

  • Target

    JaffaCakes118_a1cff2d94220e339dcfb519ff8953224ee0d33cc42f14243b8328fce1187206a

  • Size

    813.9MB

  • Sample

    241229-kn8p4sxpcw

  • MD5

    58d4426a7f3d55b8bda7092529d904d0

  • SHA1

    71ea9da9c3c92ae194a9e9e0c0b68e0cd00773df

  • SHA256

    a1cff2d94220e339dcfb519ff8953224ee0d33cc42f14243b8328fce1187206a

  • SHA512

    b3232d94147d6c09cd6dac1fd2d7a1386986958d43eca1335bbf3a36a8653926eb334ad3c4e84c319b413a0517f54af6c53b9508cc60ba608907b72197dbdb1f

  • SSDEEP

    196608:ge1KvwkWNU1qfP+tY685DxebtjBCpRdAlK/0F6:YvwktoJ5DaxyRdAlKq

Malware Config

Extracted

Family

redline

Botnet

DAISYCLOUD

C2

20.203.250.238:25580

Targets

    • Target

      JaffaCakes118_a1cff2d94220e339dcfb519ff8953224ee0d33cc42f14243b8328fce1187206a

    • Size

      813.9MB

    • MD5

      58d4426a7f3d55b8bda7092529d904d0

    • SHA1

      71ea9da9c3c92ae194a9e9e0c0b68e0cd00773df

    • SHA256

      a1cff2d94220e339dcfb519ff8953224ee0d33cc42f14243b8328fce1187206a

    • SHA512

      b3232d94147d6c09cd6dac1fd2d7a1386986958d43eca1335bbf3a36a8653926eb334ad3c4e84c319b413a0517f54af6c53b9508cc60ba608907b72197dbdb1f

    • SSDEEP

      196608:ge1KvwkWNU1qfP+tY685DxebtjBCpRdAlK/0F6:YvwktoJ5DaxyRdAlKq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks