General

  • Target

    JaffaCakes118_3f8362dfa319a1f316d9320d5e6bdf55

  • Size

    155KB

  • Sample

    250106-21ca4stpgq

  • MD5

    3f8362dfa319a1f316d9320d5e6bdf55

  • SHA1

    c5fc01cdfc8f3aff2b932141e986433f5cad7188

  • SHA256

    15d012d4d2aecbb5c8d3ad2de3d15bf3856d0b04e9fcf1a631ffa85a05060f2c

  • SHA512

    b0070c523638d5f7aa3b017bf7a00e77deccb74679b837fa1ac1cfcfb7e3174805c013d50b6711880b16339f823a673da1fe9ebab2f4c5ad86781fa7ef7e7bf9

  • SSDEEP

    3072:fa8e/PUXPyuad2ZQixAYZCOmwTGkDA6ZdstGymhzEG6:r2UyhdK5AWmwTGeZdstGyx

Malware Config

Extracted

Family

redline

C2

65.108.29.210:21638

Attributes
  • auth_value

    ad39d6a8ea7823f2a92f57ebaa4c98a5

Targets

    • Target

      JaffaCakes118_3f8362dfa319a1f316d9320d5e6bdf55

    • Size

      155KB

    • MD5

      3f8362dfa319a1f316d9320d5e6bdf55

    • SHA1

      c5fc01cdfc8f3aff2b932141e986433f5cad7188

    • SHA256

      15d012d4d2aecbb5c8d3ad2de3d15bf3856d0b04e9fcf1a631ffa85a05060f2c

    • SHA512

      b0070c523638d5f7aa3b017bf7a00e77deccb74679b837fa1ac1cfcfb7e3174805c013d50b6711880b16339f823a673da1fe9ebab2f4c5ad86781fa7ef7e7bf9

    • SSDEEP

      3072:fa8e/PUXPyuad2ZQixAYZCOmwTGkDA6ZdstGymhzEG6:r2UyhdK5AWmwTGeZdstGyx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks