Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 18:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b740a2b35529f66aedf9909807cf779c.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_b740a2b35529f66aedf9909807cf779c.exe
-
Size
369KB
-
MD5
b740a2b35529f66aedf9909807cf779c
-
SHA1
aa13ee753ce47a1362011876827b23f99f9b0493
-
SHA256
f988bd8841bd66ef75f975fff416e3eb9fc11c0603ad57f36769a36e422240be
-
SHA512
5840830f5cddb38201ca28b6b22fd0749f86115e15af6ab088a8a846fafa1ac5c47d8a13ff336c489d7882820e88d377b77e36412d09daf5a2425076f655793f
-
SSDEEP
6144:5TE7pYczts5ePdbdQT3ZAvG+Wrs5C8H5BGsJddzL/Jl5aQp:2YCtssPdRupCG+b5VGsJddzLR1p
Malware Config
Extracted
redline
mix16.10
185.215.113.15:57055
-
auth_value
408e5b97cb89314de620529179330c9a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/3844-4-0x0000000003700000-0x0000000003724000-memory.dmp family_redline behavioral2/memory/3844-7-0x0000000003A10000-0x0000000003A32000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/3844-4-0x0000000003700000-0x0000000003724000-memory.dmp family_sectoprat behavioral2/memory/3844-7-0x0000000003A10000-0x0000000003A32000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b740a2b35529f66aedf9909807cf779c.exe