General

  • Target

    JaffaCakes118_d11d414c2db40ee2e8bc9c79caed795a

  • Size

    369KB

  • Sample

    250109-ytcrhs1qfk

  • MD5

    d11d414c2db40ee2e8bc9c79caed795a

  • SHA1

    50b3234057889b2eb48a61704400b75b2805aded

  • SHA256

    6f90641debb65c1a20954d37231c8f03bd0730f557b07019ae2dec05df7e86be

  • SHA512

    a65970f3946ccbbfecace5beb963cc0656c3f11a1d7258ffd008775d8490c4a606a5c6e5ce1dc39bcca2b06f2133363f86f7d22eb438c44e01c06d711f7ead8d

  • SSDEEP

    6144:KTJJI44SI5nnx6F/Q+okePz9WrA5CS5x7GvmQaDtMEp712+n:KTJX4SIn6FYVXz9H5XGvmQaDt

Malware Config

Extracted

Family

redline

Botnet

UDP

C2

45.9.20.182:52236

Attributes
  • auth_value

    a272f3a2850ec3dccdaed97234b7c40e

Targets

    • Target

      JaffaCakes118_d11d414c2db40ee2e8bc9c79caed795a

    • Size

      369KB

    • MD5

      d11d414c2db40ee2e8bc9c79caed795a

    • SHA1

      50b3234057889b2eb48a61704400b75b2805aded

    • SHA256

      6f90641debb65c1a20954d37231c8f03bd0730f557b07019ae2dec05df7e86be

    • SHA512

      a65970f3946ccbbfecace5beb963cc0656c3f11a1d7258ffd008775d8490c4a606a5c6e5ce1dc39bcca2b06f2133363f86f7d22eb438c44e01c06d711f7ead8d

    • SSDEEP

      6144:KTJJI44SI5nnx6F/Q+okePz9WrA5CS5x7GvmQaDtMEp712+n:KTJX4SIn6FYVXz9H5XGvmQaDt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

MITRE ATT&CK Enterprise v15

Tasks