General

  • Target

    JaffaCakes118_6622fd6e4b332e162ef1f5bd55b55f4f

  • Size

    4.6MB

  • Sample

    250102-sy4sxawqd1

  • MD5

    6622fd6e4b332e162ef1f5bd55b55f4f

  • SHA1

    58c035ffebf061d5aab4326495d8ec8dd51f62b3

  • SHA256

    27cd0f7859462b5d611836a01d946a63870801ea815cf114016fed0640e5f359

  • SHA512

    7e5772d15a88d3621273794b105390f0e7826a5dd2e4bf4ec2f7100ee5fada3ae3339b9ad9e8e561c7b7b1c13e0e679b4e2cead265582d3071ff708caf4b2f6d

  • SSDEEP

    98304:bLDpBEQF/7CIZfqWif9voaJv03/RqwwVPr23VIBPg0QCoh:3FpZftif1xJ0MVProIC

Malware Config

Extracted

Family

redline

Botnet

@rington15

C2

cavanynnari.xyz:81

Attributes
  • auth_value

    584b781c29c4ce798ce009c5b16b2263

Targets

    • Target

      JaffaCakes118_6622fd6e4b332e162ef1f5bd55b55f4f

    • Size

      4.6MB

    • MD5

      6622fd6e4b332e162ef1f5bd55b55f4f

    • SHA1

      58c035ffebf061d5aab4326495d8ec8dd51f62b3

    • SHA256

      27cd0f7859462b5d611836a01d946a63870801ea815cf114016fed0640e5f359

    • SHA512

      7e5772d15a88d3621273794b105390f0e7826a5dd2e4bf4ec2f7100ee5fada3ae3339b9ad9e8e561c7b7b1c13e0e679b4e2cead265582d3071ff708caf4b2f6d

    • SSDEEP

      98304:bLDpBEQF/7CIZfqWif9voaJv03/RqwwVPr23VIBPg0QCoh:3FpZftif1xJ0MVProIC

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks