General

  • Target

    JaffaCakes118_cc484c8f3b3c7e17164cc5091ce00b31

  • Size

    4.6MB

  • Sample

    250109-td291stna1

  • MD5

    cc484c8f3b3c7e17164cc5091ce00b31

  • SHA1

    2148a1c840bb649a03ea18e579f8145659dc6e88

  • SHA256

    8fc7a3f55a4e068039ac57aeebe9122acae2b4b3e818e171072583315bc50513

  • SHA512

    a0fede90ae0c09061fc2f76ac5c0d2ad5116c77e0c0c46b684cbe1562b17440026907e059daed511a48ef9e9a1bc13db7eef5d409f35937afdaa446a56cf583b

  • SSDEEP

    98304:DLlgNr4tugVib/V2fV/vw7s95kZ8QpYxZQJKW5Li8K:0r+EJ2t/vwaCzYxCJK4Lu

Malware Config

Extracted

Family

redline

Botnet

@tyrew123

C2

164.132.202.45:20588

Attributes
  • auth_value

    3e9eda97b6589ac15756de0ba010d48f

Targets

    • Target

      JaffaCakes118_cc484c8f3b3c7e17164cc5091ce00b31

    • Size

      4.6MB

    • MD5

      cc484c8f3b3c7e17164cc5091ce00b31

    • SHA1

      2148a1c840bb649a03ea18e579f8145659dc6e88

    • SHA256

      8fc7a3f55a4e068039ac57aeebe9122acae2b4b3e818e171072583315bc50513

    • SHA512

      a0fede90ae0c09061fc2f76ac5c0d2ad5116c77e0c0c46b684cbe1562b17440026907e059daed511a48ef9e9a1bc13db7eef5d409f35937afdaa446a56cf583b

    • SSDEEP

      98304:DLlgNr4tugVib/V2fV/vw7s95kZ8QpYxZQJKW5Li8K:0r+EJ2t/vwaCzYxCJK4Lu

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks