General

  • Target

    JaffaCakes118_378088eee28e38af84b75eb9dcf671aa

  • Size

    349KB

  • Sample

    241231-z56z6ssldm

  • MD5

    378088eee28e38af84b75eb9dcf671aa

  • SHA1

    c091d335658edd3ceb9255ecd7eccc086cbae25e

  • SHA256

    345e261754c2653003e6a59a03a6f7b20a487785f8420366735c641270e1cada

  • SHA512

    6df2f5c354654dd794b326425c035690045eb40bdb489058295d9ef4a5068fd0bfc006006ad72701660bd83bcaeae775b2116c8da6fe38d32a3a02b161e44881

  • SSDEEP

    6144:QUSw3fbq4a6LKXpzdKgneetfFqJTTiabAOPSW7N88e5Qx3e9+D8:Q5w3fbq4a6Lap7CTR+0OsD8

Malware Config

Extracted

Family

redline

Botnet

@roxiq1337

C2

164.132.202.45:20588

Attributes
  • auth_value

    3e9eda97b6589ac15756de0ba010d48f

Targets

    • Target

      JaffaCakes118_378088eee28e38af84b75eb9dcf671aa

    • Size

      349KB

    • MD5

      378088eee28e38af84b75eb9dcf671aa

    • SHA1

      c091d335658edd3ceb9255ecd7eccc086cbae25e

    • SHA256

      345e261754c2653003e6a59a03a6f7b20a487785f8420366735c641270e1cada

    • SHA512

      6df2f5c354654dd794b326425c035690045eb40bdb489058295d9ef4a5068fd0bfc006006ad72701660bd83bcaeae775b2116c8da6fe38d32a3a02b161e44881

    • SSDEEP

      6144:QUSw3fbq4a6LKXpzdKgneetfFqJTTiabAOPSW7N88e5Qx3e9+D8:Q5w3fbq4a6Lap7CTR+0OsD8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks