General

  • Target

    JaffaCakes118_7c3e017e8b646b6cfcb7986555104b5f

  • Size

    4.7MB

  • Sample

    250107-178gfstkej

  • MD5

    7c3e017e8b646b6cfcb7986555104b5f

  • SHA1

    fc300c20d54e9d8bc860d65eb030372bca221fdc

  • SHA256

    9cd8514716ee60e396c229a7383aca0d7907467e07f8beb0caf515b27fd259c8

  • SHA512

    78080315035bad7815f5c47e553d7101dcf05ef4274590ec80134b47daecd7b9fbc759d6cb8be0aa630bd1d0685cbf539978143cbfeaf070a2f3ef8051bdb544

  • SSDEEP

    98304:gLhm6TbGLYj4tfKI2TO9LCVJYd7nmeua6tk6d:+TCUjMfL2SZIJYd7Qbt

Malware Config

Extracted

Family

redline

Botnet

@pamelaqw

C2

ananasalit.xyz:81

Attributes
  • auth_value

    55d48a1a930cf4d6f3e2d6bcd0daaf07

Targets

    • Target

      JaffaCakes118_7c3e017e8b646b6cfcb7986555104b5f

    • Size

      4.7MB

    • MD5

      7c3e017e8b646b6cfcb7986555104b5f

    • SHA1

      fc300c20d54e9d8bc860d65eb030372bca221fdc

    • SHA256

      9cd8514716ee60e396c229a7383aca0d7907467e07f8beb0caf515b27fd259c8

    • SHA512

      78080315035bad7815f5c47e553d7101dcf05ef4274590ec80134b47daecd7b9fbc759d6cb8be0aa630bd1d0685cbf539978143cbfeaf070a2f3ef8051bdb544

    • SSDEEP

      98304:gLhm6TbGLYj4tfKI2TO9LCVJYd7nmeua6tk6d:+TCUjMfL2SZIJYd7Qbt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks