General

  • Target

    JaffaCakes118_6036fd495ebfb8a833dd21df9147d256

  • Size

    4.6MB

  • Sample

    250101-x2hr3azkat

  • MD5

    6036fd495ebfb8a833dd21df9147d256

  • SHA1

    c25a91f2efd700bd495107ee6cd0b42d04b71f87

  • SHA256

    5088a9167ed30d60cdafd7b3ffad7062272cc7b8e4c2abdbd9ff9d667aedbe9b

  • SHA512

    468bef42aa70d41a56bc701e32e47e9ecc9dcfb098ae071b4b74c98d61b65454719e613577e235d8a50c90531e30e407d96e677367e1a6690201ea5fdd5b391c

  • SSDEEP

    98304:XLRwHw/dOY/UPCTxONhvbOT8xcqclbU83N9zWIkUY:iwoKgvGsclbUidkU

Malware Config

Extracted

Family

redline

Botnet

@Fearst5s5

C2

185.209.22.181:34925

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      JaffaCakes118_6036fd495ebfb8a833dd21df9147d256

    • Size

      4.6MB

    • MD5

      6036fd495ebfb8a833dd21df9147d256

    • SHA1

      c25a91f2efd700bd495107ee6cd0b42d04b71f87

    • SHA256

      5088a9167ed30d60cdafd7b3ffad7062272cc7b8e4c2abdbd9ff9d667aedbe9b

    • SHA512

      468bef42aa70d41a56bc701e32e47e9ecc9dcfb098ae071b4b74c98d61b65454719e613577e235d8a50c90531e30e407d96e677367e1a6690201ea5fdd5b391c

    • SSDEEP

      98304:XLRwHw/dOY/UPCTxONhvbOT8xcqclbU83N9zWIkUY:iwoKgvGsclbUidkU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks