Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 14:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2086df91eb8d962e4d8268f0074db02f.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_2086df91eb8d962e4d8268f0074db02f.exe
-
Size
365KB
-
MD5
2086df91eb8d962e4d8268f0074db02f
-
SHA1
897a04ce0716b3030ae3a6fe69424bb85f436607
-
SHA256
86c7004d5deefe31610cdf367992ae38f0fe6442d4ed3bd86ea302818bace551
-
SHA512
77c4b2ef466f9e7f7e74bacb1aa9843a07b5168c8424884d0959a5f1639f43b0a376e20964665017adaf1bbdbd35d3b8f3ef4b34d4adffbfc10eda7d7cacdb26
-
SSDEEP
6144:tY+U4CaU2OJSWXQCpr7v3ZG6mPL3SYUIGYyffyDWtEPJ8hJAoesu:eMCaU2gSWN3Z+DXUIGYyffyDWtrhJ4su
Malware Config
Extracted
redline
4
80.87.192.249:16640
-
auth_value
3e4c638c72124e45bcf5164456741cce
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/3056-3-0x00000000049D0000-0x00000000049F4000-memory.dmp family_redline behavioral1/memory/3056-5-0x00000000049F0000-0x0000000004A12000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/3056-3-0x00000000049D0000-0x00000000049F4000-memory.dmp family_sectoprat behavioral1/memory/3056-5-0x00000000049F0000-0x0000000004A12000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2086df91eb8d962e4d8268f0074db02f.exe