General

  • Target

    JaffaCakes118_c34d0cbeb22d5b05f2e01c987ec8e87f

  • Size

    547KB

  • Sample

    250109-j8rrnawrek

  • MD5

    c34d0cbeb22d5b05f2e01c987ec8e87f

  • SHA1

    32f80aa57243b7bcf9b27b377c77d5ab91a72dac

  • SHA256

    dadc5659c9328a82154dd49a1b3628826d5f8bf4a12eb412f5ed047f9dbebfc3

  • SHA512

    9b8d5131062efc84d9390cb4f406b3d09712f25cc2abf1ed1f5b98e3a1c8b95877128490c5b47860cac6d494afbcf00fc621cadb9e5b97c14c74fad56abe22c6

  • SSDEEP

    3072:dTB3AELug5IIjtgmEl74M70vVyrrgqX2lEPx/aE5WEBkS6JjkKYlj:dTBX5T840uAmWPxLbGu

Malware Config

Extracted

Family

redline

C2

141.94.188.138:46419

Attributes
  • auth_value

    3f48b95855158031ae9e7dafcb203009

Targets

    • Target

      JaffaCakes118_c34d0cbeb22d5b05f2e01c987ec8e87f

    • Size

      547KB

    • MD5

      c34d0cbeb22d5b05f2e01c987ec8e87f

    • SHA1

      32f80aa57243b7bcf9b27b377c77d5ab91a72dac

    • SHA256

      dadc5659c9328a82154dd49a1b3628826d5f8bf4a12eb412f5ed047f9dbebfc3

    • SHA512

      9b8d5131062efc84d9390cb4f406b3d09712f25cc2abf1ed1f5b98e3a1c8b95877128490c5b47860cac6d494afbcf00fc621cadb9e5b97c14c74fad56abe22c6

    • SSDEEP

      3072:dTB3AELug5IIjtgmEl74M70vVyrrgqX2lEPx/aE5WEBkS6JjkKYlj:dTBX5T840uAmWPxLbGu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks