General

  • Target

    JaffaCakes118_8c519e671488d40c0e1c8d60ce47e944

  • Size

    349KB

  • Sample

    250105-fdh99atrbr

  • MD5

    8c519e671488d40c0e1c8d60ce47e944

  • SHA1

    b99b35b33a66d6db080e06aa741f0e5a481be8cd

  • SHA256

    c06da3803a686f5f40cbd790d1781d825438f597fc33e2d2009917e383acdeca

  • SHA512

    562b6535f286020d8420ecdf756d6e4bcb62a10837c24c334f2f24adb2d11d304aec3af5ef445dc269d91a75aa22a21c4ff5ab910658d1c8114ed33a03777ad7

  • SSDEEP

    6144:oUSw3fbq4a6LKXpzdKgneetfFqJTTiabAOPSN711akl5ox3eksU:o5w3fbq4a6Lap7CTRgJMOk

Malware Config

Extracted

Family

redline

Botnet

@jayfo

C2

164.132.202.45:20588

Attributes
  • auth_value

    3e9eda97b6589ac15756de0ba010d48f

Targets

    • Target

      JaffaCakes118_8c519e671488d40c0e1c8d60ce47e944

    • Size

      349KB

    • MD5

      8c519e671488d40c0e1c8d60ce47e944

    • SHA1

      b99b35b33a66d6db080e06aa741f0e5a481be8cd

    • SHA256

      c06da3803a686f5f40cbd790d1781d825438f597fc33e2d2009917e383acdeca

    • SHA512

      562b6535f286020d8420ecdf756d6e4bcb62a10837c24c334f2f24adb2d11d304aec3af5ef445dc269d91a75aa22a21c4ff5ab910658d1c8114ed33a03777ad7

    • SSDEEP

      6144:oUSw3fbq4a6LKXpzdKgneetfFqJTTiabAOPSN711akl5ox3eksU:o5w3fbq4a6Lap7CTRgJMOk

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks