General

  • Target

    JaffaCakes118_cac075f880fb991eb7df347c82a219c7

  • Size

    413KB

  • Sample

    250109-r1mrqsslax

  • MD5

    cac075f880fb991eb7df347c82a219c7

  • SHA1

    e686015e9e3596bfa245991cd291f99ee428fc8e

  • SHA256

    d0fccd95bbf3d13aecf0301ba981395f585da51804145b73485bdabaa71159bf

  • SHA512

    ff0890888f7590eb0792b9ceee21930c901d649016b45b3957efdb934a5e5c5db22c13aa66a4494f2e7b80414c9440f4737496bba14ffb2eb44f9e567319afc3

  • SSDEEP

    6144:tNzlXTh439rDtCvzzKGsqfccbiJpyAONrlc4NyuQmCeijbnAD2iPX8Ik45CUj:tFlXTh439rDtXgllcEHQm8jcD2M7aUj

Malware Config

Extracted

Family

redline

Botnet

RXJ0IJBH

C2

188.34.176.164:80

Attributes
  • auth_value

    8bf2f6560c37a1533efe1f997b027d17

Targets

    • Target

      JaffaCakes118_cac075f880fb991eb7df347c82a219c7

    • Size

      413KB

    • MD5

      cac075f880fb991eb7df347c82a219c7

    • SHA1

      e686015e9e3596bfa245991cd291f99ee428fc8e

    • SHA256

      d0fccd95bbf3d13aecf0301ba981395f585da51804145b73485bdabaa71159bf

    • SHA512

      ff0890888f7590eb0792b9ceee21930c901d649016b45b3957efdb934a5e5c5db22c13aa66a4494f2e7b80414c9440f4737496bba14ffb2eb44f9e567319afc3

    • SSDEEP

      6144:tNzlXTh439rDtCvzzKGsqfccbiJpyAONrlc4NyuQmCeijbnAD2iPX8Ik45CUj:tFlXTh439rDtXgllcEHQm8jcD2M7aUj

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks