Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 20:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d11d414c2db40ee2e8bc9c79caed795a.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d11d414c2db40ee2e8bc9c79caed795a.exe
-
Size
369KB
-
MD5
d11d414c2db40ee2e8bc9c79caed795a
-
SHA1
50b3234057889b2eb48a61704400b75b2805aded
-
SHA256
6f90641debb65c1a20954d37231c8f03bd0730f557b07019ae2dec05df7e86be
-
SHA512
a65970f3946ccbbfecace5beb963cc0656c3f11a1d7258ffd008775d8490c4a606a5c6e5ce1dc39bcca2b06f2133363f86f7d22eb438c44e01c06d711f7ead8d
-
SSDEEP
6144:KTJJI44SI5nnx6F/Q+okePz9WrA5CS5x7GvmQaDtMEp712+n:KTJX4SIn6FYVXz9H5XGvmQaDt
Malware Config
Extracted
redline
UDP
45.9.20.182:52236
-
auth_value
a272f3a2850ec3dccdaed97234b7c40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1812-4-0x00000000003E0000-0x0000000000404000-memory.dmp family_redline behavioral1/memory/1812-5-0x00000000017F0000-0x0000000001812000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/1812-4-0x00000000003E0000-0x0000000000404000-memory.dmp family_sectoprat behavioral1/memory/1812-5-0x00000000017F0000-0x0000000001812000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d11d414c2db40ee2e8bc9c79caed795a.exe