General
-
Target
JaffaCakes118_0068f1a9d11db46097fae660005c1228
-
Size
719KB
-
Sample
250105-2zk7mazrdp
-
MD5
0068f1a9d11db46097fae660005c1228
-
SHA1
1a7fc24cccaa5bfeae87446a22605a0a475bb409
-
SHA256
88d8cfc5408b886989697c951a26e10c7ecd605bdebf3a4218dda7053002b926
-
SHA512
75525095421bf3866e4f465ed2ed89759230248ec08064865b6cf0435c254586960ee8c957a06a16a5c4693bd386338ec7554e820d94045674f172c141938a36
-
SSDEEP
6144:A7Ye0biFuvf739mHQQjpbjpS8qTh7ph6juyk4xVPEacuFO+KMMmC+Jau7TObuneF:A7YbvfQrR21rN/Fu9b4Ng7Fw
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0068f1a9d11db46097fae660005c1228.exe
Resource
win7-20240708-en
Malware Config
Extracted
redline
1.0.2.0
185.183.32.227:51498
-
auth_value
aae45f951b3721694f220729d6c8896b
Targets
-
-
Target
JaffaCakes118_0068f1a9d11db46097fae660005c1228
-
Size
719KB
-
MD5
0068f1a9d11db46097fae660005c1228
-
SHA1
1a7fc24cccaa5bfeae87446a22605a0a475bb409
-
SHA256
88d8cfc5408b886989697c951a26e10c7ecd605bdebf3a4218dda7053002b926
-
SHA512
75525095421bf3866e4f465ed2ed89759230248ec08064865b6cf0435c254586960ee8c957a06a16a5c4693bd386338ec7554e820d94045674f172c141938a36
-
SSDEEP
6144:A7Ye0biFuvf739mHQQjpbjpS8qTh7ph6juyk4xVPEacuFO+KMMmC+Jau7TObuneF:A7YbvfQrR21rN/Fu9b4Ng7Fw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-