General

  • Target

    JaffaCakes118_2e47dc7dc82b2892ae42139c98d26c91

  • Size

    729KB

  • Sample

    241231-wza4rsspat

  • MD5

    2e47dc7dc82b2892ae42139c98d26c91

  • SHA1

    d27eba5ccd3563195468351199b36bb367a8171f

  • SHA256

    c995b8273cf585457ad8e09af8b75b605c98b58b7479c56f92db6fb19475827c

  • SHA512

    8a0d75eabba806997122d5fa6f3ded185aebe018889c7fb671e7e4ca9f360d32887ec75064039b5a5cfa086062d94ac691f7858fb455125d6fef5ac4b8dcce07

  • SSDEEP

    12288:/2K1frTn62pBxY3ld7X0Rp+Qn0uzUEhhYKPEQARQvjo26tA54yiIbn6h4AcAfzyH:uO6+LAlCpvYWACb4tOj1AY1Bzh

Malware Config

Extracted

Family

redline

Botnet

@arinz512

C2

95.181.152.6:46927

Attributes
  • auth_value

    cdf3919a262c0d6ba99116b375d7551c

Targets

    • Target

      JaffaCakes118_2e47dc7dc82b2892ae42139c98d26c91

    • Size

      729KB

    • MD5

      2e47dc7dc82b2892ae42139c98d26c91

    • SHA1

      d27eba5ccd3563195468351199b36bb367a8171f

    • SHA256

      c995b8273cf585457ad8e09af8b75b605c98b58b7479c56f92db6fb19475827c

    • SHA512

      8a0d75eabba806997122d5fa6f3ded185aebe018889c7fb671e7e4ca9f360d32887ec75064039b5a5cfa086062d94ac691f7858fb455125d6fef5ac4b8dcce07

    • SSDEEP

      12288:/2K1frTn62pBxY3ld7X0Rp+Qn0uzUEhhYKPEQARQvjo26tA54yiIbn6h4AcAfzyH:uO6+LAlCpvYWACb4tOj1AY1Bzh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks