General

  • Target

    JaffaCakes118_188afe41ed907ee66fb4aa0e2d21a5e7

  • Size

    355KB

  • Sample

    250106-j5l21atmgk

  • MD5

    188afe41ed907ee66fb4aa0e2d21a5e7

  • SHA1

    b596bf85670fb3333b08acb95e18e92fc2ad5ec0

  • SHA256

    38492afcefe17b0ab8700119ca2461e044056718cef7747df58697bb942ec472

  • SHA512

    ae92d4950ad83b56ea1a1e7494000e5b72868fba9b4635cc26d145f038d00af33bfedec7bfa1a6ca06aeecef592dc4872fa838c2541a9aca0337c3fe5b9c2a58

  • SSDEEP

    6144:9AbAYfbpFzgLgESONKgTOrHfziqAOziMD3f+WSoM7e:9EAYfbpFzgLbSXNEt3e

Malware Config

Extracted

Family

redline

Botnet

@nnMembeR

C2

zellavonela.xyz:80

Attributes
  • auth_value

    584b781c29c4ce798ce009c5b16b2263

Targets

    • Target

      JaffaCakes118_188afe41ed907ee66fb4aa0e2d21a5e7

    • Size

      355KB

    • MD5

      188afe41ed907ee66fb4aa0e2d21a5e7

    • SHA1

      b596bf85670fb3333b08acb95e18e92fc2ad5ec0

    • SHA256

      38492afcefe17b0ab8700119ca2461e044056718cef7747df58697bb942ec472

    • SHA512

      ae92d4950ad83b56ea1a1e7494000e5b72868fba9b4635cc26d145f038d00af33bfedec7bfa1a6ca06aeecef592dc4872fa838c2541a9aca0337c3fe5b9c2a58

    • SSDEEP

      6144:9AbAYfbpFzgLgESONKgTOrHfziqAOziMD3f+WSoM7e:9EAYfbpFzgLbSXNEt3e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks