General

  • Target

    JaffaCakes118_4c4e47ea097ee932b8a64e8271c385b8

  • Size

    4.9MB

  • Sample

    250101-jbncza1mgm

  • MD5

    4c4e47ea097ee932b8a64e8271c385b8

  • SHA1

    ba199e203cdb5581a8176db7101b84507420d820

  • SHA256

    1edbdbdc0ffabac9bd5df90b1c0bd05aa695ae5a66cde77943bb2f564ba1da8c

  • SHA512

    9f94e816b67ce00a41ea0e6643b97ed6b8e403f7dfa47ac90fd4731de18310f4667779606e1e0bdb76bfde463cec560876746655b34a18a91a02d78843cd1311

  • SSDEEP

    98304:+LV3sGrJYaLkampuHnLBjYNs2HH4rJ3vzKJjqcRJDa5Px/KKq2swzDUv:dcYaAampq1RlrxvzKJjqSDayn04v

Malware Config

Extracted

Family

redline

Botnet

well

C2

185.238.169.158:7765

Attributes
  • auth_value

    60ec0c9678621becd603caa1ce0c1314

Targets

    • Target

      JaffaCakes118_4c4e47ea097ee932b8a64e8271c385b8

    • Size

      4.9MB

    • MD5

      4c4e47ea097ee932b8a64e8271c385b8

    • SHA1

      ba199e203cdb5581a8176db7101b84507420d820

    • SHA256

      1edbdbdc0ffabac9bd5df90b1c0bd05aa695ae5a66cde77943bb2f564ba1da8c

    • SHA512

      9f94e816b67ce00a41ea0e6643b97ed6b8e403f7dfa47ac90fd4731de18310f4667779606e1e0bdb76bfde463cec560876746655b34a18a91a02d78843cd1311

    • SSDEEP

      98304:+LV3sGrJYaLkampuHnLBjYNs2HH4rJ3vzKJjqcRJDa5Px/KKq2swzDUv:dcYaAampq1RlrxvzKJjqSDayn04v

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks