General

  • Target

    JaffaCakes118_36ff98f6d38a5b768da684f3ff2fac90

  • Size

    488KB

  • Sample

    250106-ygl5eswjh1

  • MD5

    36ff98f6d38a5b768da684f3ff2fac90

  • SHA1

    50ce974990f033d1001f72a3e34bb3090b923222

  • SHA256

    cd58ee13800267f44a8bd3d420eda383adb3926f8279eb02edccca71a17d3cb2

  • SHA512

    6252dfd46efe29929c7715300f76af5c12cb8ceb735c96d9f08dca6a2dacf2823031058c7881fbd55c4ca7a6ca1ca342f85e41319822e9c9612092b9a77ebb6d

  • SSDEEP

    12288:E3jP6cThELeBVu4o6Yqauc+15V4HCSC2bY5o5D7O531vbY:aL6l6K4ok3Ejc5oGl

Malware Config

Extracted

Family

redline

Botnet

@AbobaDance

C2

185.82.126.114:81

Attributes
  • auth_value

    55d48a1a930cf4d6f3e2d6bcd0daaf07

Targets

    • Target

      JaffaCakes118_36ff98f6d38a5b768da684f3ff2fac90

    • Size

      488KB

    • MD5

      36ff98f6d38a5b768da684f3ff2fac90

    • SHA1

      50ce974990f033d1001f72a3e34bb3090b923222

    • SHA256

      cd58ee13800267f44a8bd3d420eda383adb3926f8279eb02edccca71a17d3cb2

    • SHA512

      6252dfd46efe29929c7715300f76af5c12cb8ceb735c96d9f08dca6a2dacf2823031058c7881fbd55c4ca7a6ca1ca342f85e41319822e9c9612092b9a77ebb6d

    • SSDEEP

      12288:E3jP6cThELeBVu4o6Yqauc+15V4HCSC2bY5o5D7O531vbY:aL6l6K4ok3Ejc5oGl

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks