Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 15:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cc21667b01db651357e48ef42b810f97.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_cc21667b01db651357e48ef42b810f97.exe
-
Size
782KB
-
MD5
cc21667b01db651357e48ef42b810f97
-
SHA1
eb74c31490ebe9455fc3ad3bd6b52663f2f0e489
-
SHA256
f81e1f8605323fddc2b95c8f1508ae8f683da1aae86c4b402436e8e50a0b1ff0
-
SHA512
137a4065b72acf5ebcafa181456c863b27623cbeb245b3188fc73a640f12b2f84ee65504450f57b02605e16ce6c25ac338dbc9322e7f38e7655aac688a554cbb
-
SSDEEP
12288:dR1fu35cNcIZ2Su86wY2KX7CRDtBOkIBr7ywf20V0YLmHCdMaPEYw+8s:V4iNcIZolUIxyh0jXR78s
Malware Config
Extracted
redline
@Karkogfd
176.31.32.198:17055
-
auth_value
5d0a654aa77e883b8d4f1144b0955e9b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/216-0-0x0000000000430000-0x0000000000461000-memory.dmp family_redline behavioral2/memory/216-7-0x0000000000430000-0x0000000000461000-memory.dmp family_redline behavioral2/memory/216-9-0x0000000000920000-0x0000000000942000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/memory/216-0-0x0000000000430000-0x0000000000461000-memory.dmp family_sectoprat behavioral2/memory/216-7-0x0000000000430000-0x0000000000461000-memory.dmp family_sectoprat behavioral2/memory/216-9-0x0000000000920000-0x0000000000942000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_cc21667b01db651357e48ef42b810f97.exe