General

  • Target

    JaffaCakes118_4e93815209ee9d817ac77df5dd840824

  • Size

    4.6MB

  • Sample

    250107-fhrr7axkfk

  • MD5

    4e93815209ee9d817ac77df5dd840824

  • SHA1

    9520d0e6804864de6f37e99afa16e8b59f35fbb3

  • SHA256

    b9977573856be91850ef226b894dd27435f7b4c9b14a683b29dd3d02406d1887

  • SHA512

    d18ca38d2a50ce506dcd4dddb2486882f0908fbbd9eb0c8374dc1c5dc6095d0d398c9c9878dd22cf6476d6887edd9703add57e0f58c9e09c091549d2dcb6898b

  • SSDEEP

    98304:YLzJKZX2zRZZBSsdxE2mUV5ub02mQ8m23EVaqOKz:ZZGVZZosdxVb5cBmSVaLK

Malware Config

Extracted

Family

redline

Botnet

@zenvolord

C2

185.209.22.181:34925

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      JaffaCakes118_4e93815209ee9d817ac77df5dd840824

    • Size

      4.6MB

    • MD5

      4e93815209ee9d817ac77df5dd840824

    • SHA1

      9520d0e6804864de6f37e99afa16e8b59f35fbb3

    • SHA256

      b9977573856be91850ef226b894dd27435f7b4c9b14a683b29dd3d02406d1887

    • SHA512

      d18ca38d2a50ce506dcd4dddb2486882f0908fbbd9eb0c8374dc1c5dc6095d0d398c9c9878dd22cf6476d6887edd9703add57e0f58c9e09c091549d2dcb6898b

    • SSDEEP

      98304:YLzJKZX2zRZZBSsdxE2mUV5ub02mQ8m23EVaqOKz:ZZGVZZosdxVb5cBmSVaLK

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks