General

  • Target

    JaffaCakes118_838af7d097cd0889091657a0a3a9d7c2

  • Size

    337KB

  • Sample

    250108-btbg5azlgq

  • MD5

    838af7d097cd0889091657a0a3a9d7c2

  • SHA1

    2996ecddd5dc2b8d70ec1d3923e1d749a33b3ace

  • SHA256

    bea602032bc54bccb410cd48532a473aa1de8d566e96686a3b5ed7c07ac84cd1

  • SHA512

    10812c5ed40a88e060c8483b25ad734086bd3b603ef1d8453019c6496cd1fa0512c2930ac2d3733e0be8bf968963d4419751d2b1c03a3e8fca5dfcaccebe8468

  • SSDEEP

    6144:vk7I0vqsvvwxU6QFKrA0gphUgF2R9Q90IADG8el8:Mc0vVnn6QIrA0gp+gCQixDx

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      JaffaCakes118_838af7d097cd0889091657a0a3a9d7c2

    • Size

      337KB

    • MD5

      838af7d097cd0889091657a0a3a9d7c2

    • SHA1

      2996ecddd5dc2b8d70ec1d3923e1d749a33b3ace

    • SHA256

      bea602032bc54bccb410cd48532a473aa1de8d566e96686a3b5ed7c07ac84cd1

    • SHA512

      10812c5ed40a88e060c8483b25ad734086bd3b603ef1d8453019c6496cd1fa0512c2930ac2d3733e0be8bf968963d4419751d2b1c03a3e8fca5dfcaccebe8468

    • SSDEEP

      6144:vk7I0vqsvvwxU6QFKrA0gphUgF2R9Q90IADG8el8:Mc0vVnn6QIrA0gp+gCQixDx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks