General

  • Target

    JaffaCakes118_6513de7103d287df1954111811f654e7

  • Size

    4.7MB

  • Sample

    250102-pl1c6s1rdy

  • MD5

    6513de7103d287df1954111811f654e7

  • SHA1

    a983a7abd61a44bc304d94409f5a5ab306576f81

  • SHA256

    54b466e4332320d8bd52b5d99f6eb5eafbaae93ec29037e24a6e298c12fc219e

  • SHA512

    af0d6414c928f49fece9207fa55ccd911762591a958c496312170474c73621d7d287aedce9ed1c935840d53bce1159b5b97bb643395d6df678c55eb7dfedf59f

  • SSDEEP

    98304:QLkyncEiUrQwFWJU8YiL15dv2mLgRKjcdHYqObw2JRk:mAUrQwFcZYiJTv2Wze4Tbw2JRk

Malware Config

Extracted

Family

redline

Botnet

@Lukashenko_blyat

C2

164.132.202.45:20588

Attributes
  • auth_value

    3e9eda97b6589ac15756de0ba010d48f

Targets

    • Target

      JaffaCakes118_6513de7103d287df1954111811f654e7

    • Size

      4.7MB

    • MD5

      6513de7103d287df1954111811f654e7

    • SHA1

      a983a7abd61a44bc304d94409f5a5ab306576f81

    • SHA256

      54b466e4332320d8bd52b5d99f6eb5eafbaae93ec29037e24a6e298c12fc219e

    • SHA512

      af0d6414c928f49fece9207fa55ccd911762591a958c496312170474c73621d7d287aedce9ed1c935840d53bce1159b5b97bb643395d6df678c55eb7dfedf59f

    • SSDEEP

      98304:QLkyncEiUrQwFWJU8YiL15dv2mLgRKjcdHYqObw2JRk:mAUrQwFcZYiJTv2Wze4Tbw2JRk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks