General

  • Target

    JaffaCakes118_a8afa0d53599a0c834f211624bbed0bc

  • Size

    5.0MB

  • Sample

    250105-q7b35swkhs

  • MD5

    a8afa0d53599a0c834f211624bbed0bc

  • SHA1

    a6763aec67da918d54144fdd5ff9d2de66e4574b

  • SHA256

    aa1f78b6d224ca14e19ba9d0bff8381e360db52d27b10b3246889a387c4a3292

  • SHA512

    41d3f1202e89440b188995116e5244a50e2046e35b91e933a3b0c10b1d771acc1d191fcd3cc315d2bc430c05ae24bbcfd41e539c043a9bf87cb9228f6bd23a39

  • SSDEEP

    98304:lLXZ2+8B3LnehT9qZZjKmRhZTXibS/BXbh3iw/Wha2P3ODmux:i+Q3LObo7/Rh3t+3ODmU

Malware Config

Extracted

Family

redline

Botnet

good

C2

185.238.169.158:7765

Attributes
  • auth_value

    60ec0c9678621becd603caa1ce0c1314

Targets

    • Target

      JaffaCakes118_a8afa0d53599a0c834f211624bbed0bc

    • Size

      5.0MB

    • MD5

      a8afa0d53599a0c834f211624bbed0bc

    • SHA1

      a6763aec67da918d54144fdd5ff9d2de66e4574b

    • SHA256

      aa1f78b6d224ca14e19ba9d0bff8381e360db52d27b10b3246889a387c4a3292

    • SHA512

      41d3f1202e89440b188995116e5244a50e2046e35b91e933a3b0c10b1d771acc1d191fcd3cc315d2bc430c05ae24bbcfd41e539c043a9bf87cb9228f6bd23a39

    • SSDEEP

      98304:lLXZ2+8B3LnehT9qZZjKmRhZTXibS/BXbh3iw/Wha2P3ODmux:i+Q3LObo7/Rh3t+3ODmU

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks