General

  • Target

    JaffaCakes118_1d2aaba97496b864054694c6216388ac

  • Size

    3.8MB

  • Sample

    241231-qamtda1nhv

  • MD5

    1d2aaba97496b864054694c6216388ac

  • SHA1

    62347dc63a2f7906a25b472bb92d20f4a3479e63

  • SHA256

    ed4a28ec27097c7c5482542c063081ad860b1fd57a0f52ca6edded969d6d9641

  • SHA512

    4fc6886ca7ae1e93a5a5a144920b82854eb4ddcfcacdd313d9b5fdb4adcb401e5e2d65a0575c2a2cc98212972b10c6037f3ffe9cb902bbfd127736dd891e1936

  • SSDEEP

    98304:8bpOyMT2xhZ8KOaAM2ijq6qk0jd1tjcl+Lu:8NM2J8KVnvERS+Lu

Malware Config

Extracted

Family

redline

Botnet

@asasinalex

C2

164.132.202.45:20588

Attributes
  • auth_value

    3e9eda97b6589ac15756de0ba010d48f

Targets

    • Target

      JaffaCakes118_1d2aaba97496b864054694c6216388ac

    • Size

      3.8MB

    • MD5

      1d2aaba97496b864054694c6216388ac

    • SHA1

      62347dc63a2f7906a25b472bb92d20f4a3479e63

    • SHA256

      ed4a28ec27097c7c5482542c063081ad860b1fd57a0f52ca6edded969d6d9641

    • SHA512

      4fc6886ca7ae1e93a5a5a144920b82854eb4ddcfcacdd313d9b5fdb4adcb401e5e2d65a0575c2a2cc98212972b10c6037f3ffe9cb902bbfd127736dd891e1936

    • SSDEEP

      98304:8bpOyMT2xhZ8KOaAM2ijq6qk0jd1tjcl+Lu:8NM2J8KVnvERS+Lu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks