General

  • Target

    JaffaCakes118_24c76ff271bc532541ad4111d6ab9b1f

  • Size

    4.7MB

  • Sample

    250106-p4rtraxjbx

  • MD5

    24c76ff271bc532541ad4111d6ab9b1f

  • SHA1

    9dbdf74b8769cf659390c2fc8bb4fc51cd8cf139

  • SHA256

    a2451cae3ad1c6d645b76e03d680c6edf5993b3eaf6f2cf39ec55e038d0cd76f

  • SHA512

    871777fc47bca575983f1aa8df590f3b6cff2214d5b62ec7eb5a625eae52b90c17db9ad2edd7c44bdb84fed7db754640130812fc3d85ca4c556b19606bd38c4f

  • SSDEEP

    98304:JLAnaKDLK0shf5pj8qAfH6r8nAKhvhE+MEdFsQRLbKsR:4nLKlDB8148AKpKk+QRz

Malware Config

Extracted

Family

redline

Botnet

1704499439

C2

94.26.248.120:63731

Attributes
  • auth_value

    ee8187fd574be73a935e073f8b5705eb

Targets

    • Target

      JaffaCakes118_24c76ff271bc532541ad4111d6ab9b1f

    • Size

      4.7MB

    • MD5

      24c76ff271bc532541ad4111d6ab9b1f

    • SHA1

      9dbdf74b8769cf659390c2fc8bb4fc51cd8cf139

    • SHA256

      a2451cae3ad1c6d645b76e03d680c6edf5993b3eaf6f2cf39ec55e038d0cd76f

    • SHA512

      871777fc47bca575983f1aa8df590f3b6cff2214d5b62ec7eb5a625eae52b90c17db9ad2edd7c44bdb84fed7db754640130812fc3d85ca4c556b19606bd38c4f

    • SSDEEP

      98304:JLAnaKDLK0shf5pj8qAfH6r8nAKhvhE+MEdFsQRLbKsR:4nLKlDB8148AKpKk+QRz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks