Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 17:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5ecb7074e9f5015254585ac74eb3e4e1.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_5ecb7074e9f5015254585ac74eb3e4e1.exe
-
Size
417KB
-
MD5
5ecb7074e9f5015254585ac74eb3e4e1
-
SHA1
8cd3bd9a0257a81d1f8c1b3e2ee6b027a8b31319
-
SHA256
fb7598f34566f1ceb68133043cab51f06cea491f32cfe38e014f32290cf55896
-
SHA512
9dddfb3d10cc25e53031fc28378786da39fd8366d8c145959937ada5eb60dc51908357ce2b659e2582bfcb11f0bed646e2f09388e5be87e1a313acb9550a5e83
-
SSDEEP
12288:JkaQznECqHvx+g01kUnLSdxOzI96ZqS8+ePQ:J2Arx+gNULzI96k
Malware Config
Extracted
redline
sewPalp
185.215.113.29:24645
-
auth_value
41d3df6d093b1e36993abf16af0d6f2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2844-5-0x00000000003E0000-0x0000000000404000-memory.dmp family_redline behavioral1/memory/2844-6-0x0000000000B20000-0x0000000000B42000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2844-5-0x00000000003E0000-0x0000000000404000-memory.dmp family_sectoprat behavioral1/memory/2844-6-0x0000000000B20000-0x0000000000B42000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5ecb7074e9f5015254585ac74eb3e4e1.exe