Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_171c94ac2297a47e836f3665aeacff8d.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_171c94ac2297a47e836f3665aeacff8d.exe
-
Size
366KB
-
MD5
171c94ac2297a47e836f3665aeacff8d
-
SHA1
6d40df340304405a1c79a192b41a35b7417247f4
-
SHA256
eff20fcad43e1285078db09eda1eadab4df557e79a0e58ebeff959c79455ff0d
-
SHA512
c4a5715dc204423d23a224e740028d4f0439b0c076b6c5ad7bc3b86fde8b77115b7ce43aebd3ace8751b4ac1322fc4bfe3ccd61f96df79de1c89dd4c525be4f2
-
SSDEEP
6144:wijnTUAx2iswvh4hQwbq+Z+CKOF3N+0l1D2qX7tNfVXVHQLIiu8cfo0/pWm:wiLTUAx9hhC+C1++2wZGEX8cA0/Mm
Malware Config
Extracted
redline
UTS
45.9.20.182:52236
-
auth_value
a272f3a2850ec3dccdaed97234b7c40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2084-3-0x00000000003E0000-0x0000000000404000-memory.dmp family_redline behavioral1/memory/2084-4-0x0000000004C90000-0x0000000004CB2000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2084-3-0x00000000003E0000-0x0000000000404000-memory.dmp family_sectoprat behavioral1/memory/2084-4-0x0000000004C90000-0x0000000004CB2000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_171c94ac2297a47e836f3665aeacff8d.exe