General

  • Target

    JaffaCakes118_49d56f59d7f7384f88f6ee48a06a9e73

  • Size

    407KB

  • Sample

    250107-djqkea1maw

  • MD5

    49d56f59d7f7384f88f6ee48a06a9e73

  • SHA1

    94b1a709b9d25192a6b3d024a51585534f1a8118

  • SHA256

    375d801fe4c5b48912f2fa1d5bdd729b0ad2d1f4a99776fe8e839e30e2d43a48

  • SHA512

    2f7bac5403d01eb7469bb2640baff6d01f7f48fed834845ce0480c40c719098e5a2f65dd450a0c04a3e6110850a03a03e2c4fa49e35b98f8649f72fabaed39d3

  • SSDEEP

    6144:fmlweoYLnJSOdr2dfKq6OpTzlbOf11nRwbD4tPc0hHJuIZz6mf:fmlPoYr21wQRq1P+DqPc0hQYz6K

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      JaffaCakes118_49d56f59d7f7384f88f6ee48a06a9e73

    • Size

      407KB

    • MD5

      49d56f59d7f7384f88f6ee48a06a9e73

    • SHA1

      94b1a709b9d25192a6b3d024a51585534f1a8118

    • SHA256

      375d801fe4c5b48912f2fa1d5bdd729b0ad2d1f4a99776fe8e839e30e2d43a48

    • SHA512

      2f7bac5403d01eb7469bb2640baff6d01f7f48fed834845ce0480c40c719098e5a2f65dd450a0c04a3e6110850a03a03e2c4fa49e35b98f8649f72fabaed39d3

    • SSDEEP

      6144:fmlweoYLnJSOdr2dfKq6OpTzlbOf11nRwbD4tPc0hHJuIZz6mf:fmlPoYr21wQRq1P+DqPc0hQYz6K

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks