Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 06:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9211ce6298b94bfb80c4c4750e5cc491.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_9211ce6298b94bfb80c4c4750e5cc491.exe
-
Size
753KB
-
MD5
9211ce6298b94bfb80c4c4750e5cc491
-
SHA1
d799df21b865eec50e940cd45e7ca064adb3777d
-
SHA256
0ba0e4522c1549a6f8e436003b2456411b6c1bc5eca438cc16996587fa06000d
-
SHA512
5f154aeb8fd175b751570bad6aac21540ba2222ad14341d7975a967975a90ed529ff4b34af0521cb771c476c623bafa2440249e4df8d9d0f22728ecb0e429c34
-
SSDEEP
12288:rG+TR9OytDyDhgmUfOutqbq3oO1xAFUgS2aU5PYQf72MbKwHz969ImgCnKxE+TA8:rPvEmKy1i/YQfqMbKwHz96CmDnUE+cc
Malware Config
Extracted
redline
@rrk0o
95.216.43.58:40566
-
auth_value
fd7f71b079c843a407d5a0e4eb4dfa03
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/4720-0-0x0000000002690000-0x00000000026C1000-memory.dmp family_redline behavioral2/memory/4720-8-0x0000000002AF0000-0x0000000002B12000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/4720-0-0x0000000002690000-0x00000000026C1000-memory.dmp family_sectoprat behavioral2/memory/4720-8-0x0000000002AF0000-0x0000000002B12000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9211ce6298b94bfb80c4c4750e5cc491.exe