General

  • Target

    JaffaCakes118_7a563b19e0f30901e47430f2d1855356

  • Size

    4.7MB

  • Sample

    250107-1b446azjdt

  • MD5

    7a563b19e0f30901e47430f2d1855356

  • SHA1

    44b863df97055f5eb47a85c84f1d0efc0bfd7fb6

  • SHA256

    679ab6829396afa4e7637743385d2676fa3842bff6099e4a94a89e9017c63b72

  • SHA512

    2aacd860d502d5d7b5d186a7575b64bf8663bfca83a4f8e49c988b952d68fb10636f2a6d5c94fa80d63b940dea1415c3ec5bbb6f748b1f6b1f42ec1a4594b738

  • SSDEEP

    98304:YLoijyYrL08xAYL2OR3xKIkOCC7rmn81xI3yJXSFw2gTV+tTS9IC6B2:pnYn7AGRBsC7rH1xrXutuSJB

Malware Config

Extracted

Family

redline

Botnet

@alexsandrovnaaaaaa

C2

ananasalit.xyz:81

Attributes
  • auth_value

    55d48a1a930cf4d6f3e2d6bcd0daaf07

Targets

    • Target

      JaffaCakes118_7a563b19e0f30901e47430f2d1855356

    • Size

      4.7MB

    • MD5

      7a563b19e0f30901e47430f2d1855356

    • SHA1

      44b863df97055f5eb47a85c84f1d0efc0bfd7fb6

    • SHA256

      679ab6829396afa4e7637743385d2676fa3842bff6099e4a94a89e9017c63b72

    • SHA512

      2aacd860d502d5d7b5d186a7575b64bf8663bfca83a4f8e49c988b952d68fb10636f2a6d5c94fa80d63b940dea1415c3ec5bbb6f748b1f6b1f42ec1a4594b738

    • SSDEEP

      98304:YLoijyYrL08xAYL2OR3xKIkOCC7rmn81xI3yJXSFw2gTV+tTS9IC6B2:pnYn7AGRBsC7rH1xrXutuSJB

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks