Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 19:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d0cbae8520f317c01650ace9ec9eea76.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_d0cbae8520f317c01650ace9ec9eea76.exe
-
Size
824KB
-
MD5
d0cbae8520f317c01650ace9ec9eea76
-
SHA1
583d14d47ab09d59a8f59814d9ad637cab7698da
-
SHA256
6acde5e534c4eeb9a00db20d98a5926b072fc59869d4c17aecfedd90aba2923c
-
SHA512
165a8f2c9450e9c56fdea2c2a6f408048cbf5a091b28f4911f80990d43fac43bec3f9612f6635062ca885024ef57a78cd0e3672f7315c6fd1c76a79e9932b287
-
SSDEEP
24576:ej7gjDzRXktIrNoe8lDUN2XT6SWDqnpJA:1VktzRUN8utz
Malware Config
Extracted
redline
@F1gaSebe
95.181.152.5:46927
-
auth_value
cdf3919a262c0d6ba99116b375d7551c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/468-0-0x0000000000460000-0x0000000000491000-memory.dmp family_redline behavioral2/memory/468-7-0x0000000000460000-0x0000000000491000-memory.dmp family_redline behavioral2/memory/468-9-0x0000000002AF0000-0x0000000002B12000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/memory/468-0-0x0000000000460000-0x0000000000491000-memory.dmp family_sectoprat behavioral2/memory/468-7-0x0000000000460000-0x0000000000491000-memory.dmp family_sectoprat behavioral2/memory/468-9-0x0000000002AF0000-0x0000000002B12000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d0cbae8520f317c01650ace9ec9eea76.exe