Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 22:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_73715b3318e15d4b5e9ab1679f295a0b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_73715b3318e15d4b5e9ab1679f295a0b.exe
-
Size
366KB
-
MD5
73715b3318e15d4b5e9ab1679f295a0b
-
SHA1
c01ee1d1300c2919477723eb1a6812d40ed5b103
-
SHA256
d0b8fa81bbdc0fec334afc74e0cd33f2fc941eb636cfd700129d4026a761baa4
-
SHA512
1b6c3b4d5064fbf2c212618942702c5f34e5b0fbd24bd3436c0033ac386932d04f9202da834ecd154337917f66137314be29ba04ceb24702de2a969dca2fec0b
-
SSDEEP
6144:7uYqib+jySdYwbq1glZqSzcqNOdBq/f5qmUkuOZTJYy:C6+WSdYwG1gl7UdBq/f1UkuC2y
Malware Config
Extracted
redline
usamoney
45.142.215.47:27643
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2520-4-0x00000000030F0000-0x0000000003114000-memory.dmp family_redline behavioral1/memory/2520-5-0x0000000003110000-0x0000000003132000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2520-4-0x00000000030F0000-0x0000000003114000-memory.dmp family_sectoprat behavioral1/memory/2520-5-0x0000000003110000-0x0000000003132000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_73715b3318e15d4b5e9ab1679f295a0b.exe