General

  • Target

    JaffaCakes118_a1c70aa369668b00b8392b82115fe72b

  • Size

    1009KB

  • Sample

    250108-qn258atneq

  • MD5

    a1c70aa369668b00b8392b82115fe72b

  • SHA1

    cb910de4f365fe67bc37783687e9281f802e115f

  • SHA256

    d91d72f391d5c4a55f82b5910b1426afc19f3af28ec9603e60f287d4de768a86

  • SHA512

    44fb962082a79d585f6e499963fa65c1ac7c758ff0b489d50ad5655b9c5e24e05b305932ee072db6f4a34d84ab7d24087d5fe9df0ffb8b11ccc6ab90460745f6

  • SSDEEP

    24576:dvvrR6K/pKSbGK5pCwPJN9JBpXvrR6K/pKSbGK5pCwPJN9JB5ZX:dvDgKhGK5FNLBpTgKhGK5FNLBv

Malware Config

Extracted

Family

redline

Botnet

YTUploader [greenbin-card]

C2

greenbin-card.site:1026

Attributes
  • auth_value

    30073e5da439091f4d55949b78fea690

Targets

    • Target

      JaffaCakes118_a1c70aa369668b00b8392b82115fe72b

    • Size

      1009KB

    • MD5

      a1c70aa369668b00b8392b82115fe72b

    • SHA1

      cb910de4f365fe67bc37783687e9281f802e115f

    • SHA256

      d91d72f391d5c4a55f82b5910b1426afc19f3af28ec9603e60f287d4de768a86

    • SHA512

      44fb962082a79d585f6e499963fa65c1ac7c758ff0b489d50ad5655b9c5e24e05b305932ee072db6f4a34d84ab7d24087d5fe9df0ffb8b11ccc6ab90460745f6

    • SSDEEP

      24576:dvvrR6K/pKSbGK5pCwPJN9JBpXvrR6K/pKSbGK5pCwPJN9JB5ZX:dvDgKhGK5FNLBpTgKhGK5FNLBv

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks