General

  • Target

    JaffaCakes118_59991c43b79587b29d9040380fc13714

  • Size

    212KB

  • Sample

    250107-kwweratndt

  • MD5

    59991c43b79587b29d9040380fc13714

  • SHA1

    fe5bfafee21a4f24d7cad283c0d5582f454fff89

  • SHA256

    10fa1ee7624ba7446ff9e959262082f2d0c779f6f5515dc865a7188d49701a0c

  • SHA512

    460071d5693d141741a0234cd249c45b8c427bb49e4eef7b2173f66b71ec05d26fc1c91e7a779b6cc1e64e7305909d042c831154fe3e707bce8562d234b28728

  • SSDEEP

    1536:GfyxN9r3PWQF1Ree4OWyzY6I4HLSaIMNnapdr/DRbH5Tc+QRRk9pqXWLcOh6P3X2:AoN5+m1kenPT/LSaISnkRbRxaGbLQ3G

Malware Config

Extracted

Family

redline

Botnet

@bloodyrain12

C2

51.91.193.177:18717

Attributes
  • auth_value

    74a8f00abc3c55d9a0655f0cea4e3580

Targets

    • Target

      JaffaCakes118_59991c43b79587b29d9040380fc13714

    • Size

      212KB

    • MD5

      59991c43b79587b29d9040380fc13714

    • SHA1

      fe5bfafee21a4f24d7cad283c0d5582f454fff89

    • SHA256

      10fa1ee7624ba7446ff9e959262082f2d0c779f6f5515dc865a7188d49701a0c

    • SHA512

      460071d5693d141741a0234cd249c45b8c427bb49e4eef7b2173f66b71ec05d26fc1c91e7a779b6cc1e64e7305909d042c831154fe3e707bce8562d234b28728

    • SSDEEP

      1536:GfyxN9r3PWQF1Ree4OWyzY6I4HLSaIMNnapdr/DRbH5Tc+QRRk9pqXWLcOh6P3X2:AoN5+m1kenPT/LSaISnkRbRxaGbLQ3G

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks