General

  • Target

    JaffaCakes118_49d7ccef39eee1d23f2fd391707801ca

  • Size

    4.7MB

  • Sample

    250107-djy7jstjhj

  • MD5

    49d7ccef39eee1d23f2fd391707801ca

  • SHA1

    a7e48fce9f80de808428d6201cf5f715b29c4688

  • SHA256

    8d151ee2c028a6a64af6437cd11c8ee07b2dae9a130ea71e9d7bb0706a3a482d

  • SHA512

    0bccdbe9f04956ab99eb5f4d8e41d718464b4d51440c16c7ad4d03df1bda5852f6976c690f6064fae064426a8b3c7d0f58e2302386af6e7f72bea0555fdd029b

  • SSDEEP

    98304:fL5xuVsvzOkxhSj6hUvpjRQ6h77tQ/qLejTktz:HLBxh7hUtRf7S/qLn

Malware Config

Extracted

Family

redline

Botnet

1008765295

C2

94.26.248.120:63731

Attributes
  • auth_value

    ee8187fd574be73a935e073f8b5705eb

Targets

    • Target

      JaffaCakes118_49d7ccef39eee1d23f2fd391707801ca

    • Size

      4.7MB

    • MD5

      49d7ccef39eee1d23f2fd391707801ca

    • SHA1

      a7e48fce9f80de808428d6201cf5f715b29c4688

    • SHA256

      8d151ee2c028a6a64af6437cd11c8ee07b2dae9a130ea71e9d7bb0706a3a482d

    • SHA512

      0bccdbe9f04956ab99eb5f4d8e41d718464b4d51440c16c7ad4d03df1bda5852f6976c690f6064fae064426a8b3c7d0f58e2302386af6e7f72bea0555fdd029b

    • SSDEEP

      98304:fL5xuVsvzOkxhSj6hUvpjRQ6h77tQ/qLejTktz:HLBxh7hUtRf7S/qLn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks