General

  • Target

    JaffaCakes118_3f59803d76d13e68ce3a1820f827bbd3

  • Size

    358KB

  • Sample

    241231-3t1wkawkbv

  • MD5

    3f59803d76d13e68ce3a1820f827bbd3

  • SHA1

    c6f2c35f5afc951e24cf71fdd36b193136ee7021

  • SHA256

    ee82db8edcbbfb6963920e2192b8e3ac4228602a23603419c3e3946321f15794

  • SHA512

    06d97ff3fde2ea823674999c28088365185fae9449cc26e39fc6456242f04653b44a8a2ddafb3a7fd27e09cac96f950ecfb4804721a40de7bb2a1c46c8f09aae

  • SSDEEP

    6144:PUSw3fbq4a6LKXpzdKgneetfFqJTTiabAOPSLXQuQmh8lwsAbFDo5PoQN9sz:P5w3fbq4a6Lap7CTRgg9mh8lwsMDdQw

Malware Config

Extracted

Family

redline

Botnet

@toxictyle

C2

92.119.113.189:21746

Attributes
  • auth_value

    de713911efa818890ac36085c9a0fc58

Targets

    • Target

      JaffaCakes118_3f59803d76d13e68ce3a1820f827bbd3

    • Size

      358KB

    • MD5

      3f59803d76d13e68ce3a1820f827bbd3

    • SHA1

      c6f2c35f5afc951e24cf71fdd36b193136ee7021

    • SHA256

      ee82db8edcbbfb6963920e2192b8e3ac4228602a23603419c3e3946321f15794

    • SHA512

      06d97ff3fde2ea823674999c28088365185fae9449cc26e39fc6456242f04653b44a8a2ddafb3a7fd27e09cac96f950ecfb4804721a40de7bb2a1c46c8f09aae

    • SSDEEP

      6144:PUSw3fbq4a6LKXpzdKgneetfFqJTTiabAOPSLXQuQmh8lwsAbFDo5PoQN9sz:P5w3fbq4a6Lap7CTRgg9mh8lwsMDdQw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks