General

  • Target

    JaffaCakes118_80d8710f1c10628701c4a11d18399b19

  • Size

    4.7MB

  • Sample

    250105-a9xvmaxphr

  • MD5

    80d8710f1c10628701c4a11d18399b19

  • SHA1

    f91c5c625771658ad2807602860ba5d697cbc574

  • SHA256

    03943cdb6ced5cc0fe75f6fd2f7c6da64eabc08c5d3fcd3eb202e9ea497da28e

  • SHA512

    350089787715874602e8fcd732b6fdeca4c6a88e26a7e9bf403c7837560dade94eb5350673a0244534238bd52665de39fa229413567a4c94116502dc9dd484a0

  • SSDEEP

    98304:NLC9nMZg68Ro7hMdZmCslT16bgc0dmmkq/rrd+stn:GMZqo7g9slT6onkiH

Malware Config

Extracted

Family

redline

Botnet

@hensssy

C2

ananasalit.xyz:81

Attributes
  • auth_value

    55d48a1a930cf4d6f3e2d6bcd0daaf07

Targets

    • Target

      JaffaCakes118_80d8710f1c10628701c4a11d18399b19

    • Size

      4.7MB

    • MD5

      80d8710f1c10628701c4a11d18399b19

    • SHA1

      f91c5c625771658ad2807602860ba5d697cbc574

    • SHA256

      03943cdb6ced5cc0fe75f6fd2f7c6da64eabc08c5d3fcd3eb202e9ea497da28e

    • SHA512

      350089787715874602e8fcd732b6fdeca4c6a88e26a7e9bf403c7837560dade94eb5350673a0244534238bd52665de39fa229413567a4c94116502dc9dd484a0

    • SSDEEP

      98304:NLC9nMZg68Ro7hMdZmCslT16bgc0dmmkq/rrd+stn:GMZqo7g9slT6onkiH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks