General

  • Target

    JaffaCakes118_36b6f2a0b3456c969ddc30cca453df01

  • Size

    342KB

  • Sample

    241231-zv3vrs1qcn

  • MD5

    36b6f2a0b3456c969ddc30cca453df01

  • SHA1

    b300e0177bd61197c56f33ec5184875464a61dd8

  • SHA256

    50bf7a71e2ff0fe1b9bbad57a04684f655213b84541031f09fbab255aa01c954

  • SHA512

    eb582ed4a66a1edc51e42d238b7157b15179afe2ca78dd33a1b19fb8da70c959b61736aa948e4b66f0128a0e7b00645cb8306b39c9526226e5e451f41e8c35d0

  • SSDEEP

    6144:gNzlXTh439rDtCvzzKGsqfccbiJpyAON/G0ConjQp1vdsL24lQvrZhy:gFlXTh439rDtXgli5BpUL2Qqw

Malware Config

Extracted

Family

redline

Botnet

@e0neee

C2

185.209.22.181:34925

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      JaffaCakes118_36b6f2a0b3456c969ddc30cca453df01

    • Size

      342KB

    • MD5

      36b6f2a0b3456c969ddc30cca453df01

    • SHA1

      b300e0177bd61197c56f33ec5184875464a61dd8

    • SHA256

      50bf7a71e2ff0fe1b9bbad57a04684f655213b84541031f09fbab255aa01c954

    • SHA512

      eb582ed4a66a1edc51e42d238b7157b15179afe2ca78dd33a1b19fb8da70c959b61736aa948e4b66f0128a0e7b00645cb8306b39c9526226e5e451f41e8c35d0

    • SSDEEP

      6144:gNzlXTh439rDtCvzzKGsqfccbiJpyAON/G0ConjQp1vdsL24lQvrZhy:gFlXTh439rDtXgli5BpUL2Qqw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks