General

  • Target

    JaffaCakes118_95029e00a50b60c370c4fcdc60cb0b6d

  • Size

    656KB

  • Sample

    250108-j4elja1pet

  • MD5

    95029e00a50b60c370c4fcdc60cb0b6d

  • SHA1

    c4d156c2f55fae1cc834e5f0a455d7804dc005eb

  • SHA256

    46364afc53eb092dd409e8b31aa2bac984388678baef9154a8dac3d2aee58bfd

  • SHA512

    8fa4ddc75198894f8e6bffef5331b3b98c759cdc6ee60333d66db5084b0b16981d9d7f20ec41c0988152275c33853ab31882648be4ea7f3b332d591ef634ae60

  • SSDEEP

    12288:tIi+GQt8zx0n1xj91EScKT4m97HtO1iSK9+v9uyQoFeKl590QX:CGQt8zMjTrDzLI1Tl99QQdt7X

Malware Config

Extracted

Family

redline

Botnet

itit

C2

185.213.211.110:35105

Attributes
  • auth_value

    51a095dbbca5fcbb737627bad64772ae

Targets

    • Target

      JaffaCakes118_95029e00a50b60c370c4fcdc60cb0b6d

    • Size

      656KB

    • MD5

      95029e00a50b60c370c4fcdc60cb0b6d

    • SHA1

      c4d156c2f55fae1cc834e5f0a455d7804dc005eb

    • SHA256

      46364afc53eb092dd409e8b31aa2bac984388678baef9154a8dac3d2aee58bfd

    • SHA512

      8fa4ddc75198894f8e6bffef5331b3b98c759cdc6ee60333d66db5084b0b16981d9d7f20ec41c0988152275c33853ab31882648be4ea7f3b332d591ef634ae60

    • SSDEEP

      12288:tIi+GQt8zx0n1xj91EScKT4m97HtO1iSK9+v9uyQoFeKl590QX:CGQt8zMjTrDzLI1Tl99QQdt7X

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks