General

  • Target

    JaffaCakes118_609963e66bf4b68a8b0ef61781a9377a

  • Size

    4.7MB

  • Sample

    250101-zn3lestmfv

  • MD5

    609963e66bf4b68a8b0ef61781a9377a

  • SHA1

    dd62a564ae8fdb6b1b3b710f1489dfa650d842ca

  • SHA256

    ba0ca202c4dcac2064b270dbd33184ec47acde0ba511a36e9de86c9cda7ea0ea

  • SHA512

    1380e17132903e275d4aa640bfb6a074b27cdae792d4bd0f466e96f863ed98538dd95335d2d1dcd7f176ee7933d7dfcbc50594bee852095cc051b62ed5191364

  • SSDEEP

    98304:CLQDVBjilIARK6YMATvjIpB4W3cfA8Q/M+64j+DPsQRHvqROog9SvJxaUW70tKPl:PBWWAYMKjIpBmdQ/zV+DPpv8wSRxaf7r

Malware Config

Extracted

Family

redline

Botnet

@o1p3n

C2

cavanynnari.xyz:81

Attributes
  • auth_value

    584b781c29c4ce798ce009c5b16b2263

Targets

    • Target

      JaffaCakes118_609963e66bf4b68a8b0ef61781a9377a

    • Size

      4.7MB

    • MD5

      609963e66bf4b68a8b0ef61781a9377a

    • SHA1

      dd62a564ae8fdb6b1b3b710f1489dfa650d842ca

    • SHA256

      ba0ca202c4dcac2064b270dbd33184ec47acde0ba511a36e9de86c9cda7ea0ea

    • SHA512

      1380e17132903e275d4aa640bfb6a074b27cdae792d4bd0f466e96f863ed98538dd95335d2d1dcd7f176ee7933d7dfcbc50594bee852095cc051b62ed5191364

    • SSDEEP

      98304:CLQDVBjilIARK6YMATvjIpB4W3cfA8Q/M+64j+DPsQRHvqROog9SvJxaUW70tKPl:PBWWAYMKjIpBmdQ/zV+DPpv8wSRxaf7r

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks