General

  • Target

    JaffaCakes118_6b3bfdece641bfedf655f56f8b60a997

  • Size

    4.6MB

  • Sample

    250107-s3jzasyqcj

  • MD5

    6b3bfdece641bfedf655f56f8b60a997

  • SHA1

    9ef5a9b2b6f84a47fd7400fc5a441d304451f668

  • SHA256

    53dae3adf7b19683eb158318b223223df50c0c710c1c253cd1f90f8a57e14945

  • SHA512

    add7ea7c46a53707b45d4bb8564f06a017712bb18ea5edf1425d7a9aec7cb436969fab5c19f2fa88c2a5ee4f34f1fbc6cc27111a5f639d53cc360bc628766367

  • SSDEEP

    98304:wL9skSpoYgTXgp9L8iRJWzkKL/eVYi1tIACpKolMI9tiJwthGg5qEr:9gr09L8iRXKL/Y1TWxlMZqLiE

Malware Config

Extracted

Family

redline

Botnet

@Js_scr

C2

164.132.202.45:20588

Attributes
  • auth_value

    3e9eda97b6589ac15756de0ba010d48f

Targets

    • Target

      JaffaCakes118_6b3bfdece641bfedf655f56f8b60a997

    • Size

      4.6MB

    • MD5

      6b3bfdece641bfedf655f56f8b60a997

    • SHA1

      9ef5a9b2b6f84a47fd7400fc5a441d304451f668

    • SHA256

      53dae3adf7b19683eb158318b223223df50c0c710c1c253cd1f90f8a57e14945

    • SHA512

      add7ea7c46a53707b45d4bb8564f06a017712bb18ea5edf1425d7a9aec7cb436969fab5c19f2fa88c2a5ee4f34f1fbc6cc27111a5f639d53cc360bc628766367

    • SSDEEP

      98304:wL9skSpoYgTXgp9L8iRJWzkKL/eVYi1tIACpKolMI9tiJwthGg5qEr:9gr09L8iRXKL/Y1TWxlMZqLiE

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks