Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 04:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e650ab9c825abce879b0f2db084eb38.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_0e650ab9c825abce879b0f2db084eb38.exe
-
Size
337KB
-
MD5
0e650ab9c825abce879b0f2db084eb38
-
SHA1
84e57fd2dba5467f4bc2d8f29ea2f177fd9428dc
-
SHA256
a04401541f4ea1d311699241b8bd03c641da0d87dfbb4fefb04903b0eba03ecb
-
SHA512
ad8a569e9e93c3831a95bb0adcac9f4bce9087e6256471a70a16a65e0a9757e7a1287aa8ded94d2b50a4976aae1c9f129539d396fa7941138396cdf20e39b54f
-
SSDEEP
6144:4HGHL5BgiSio083GLv8jmS+YFAgJX+bIADG8elP:4mHL7giFod2T8jm10X+bxDy
Malware Config
Extracted
redline
UTS
45.9.20.182:52236
-
auth_value
a272f3a2850ec3dccdaed97234b7c40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/4180-3-0x0000000004E20000-0x0000000004E44000-memory.dmp family_redline behavioral2/memory/4180-5-0x0000000004FB0000-0x0000000004FD2000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/4180-3-0x0000000004E20000-0x0000000004E44000-memory.dmp family_sectoprat behavioral2/memory/4180-5-0x0000000004FB0000-0x0000000004FD2000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e650ab9c825abce879b0f2db084eb38.exe