General
-
Target
JaffaCakes118_d12f20d20f23819ef3448bc10873ba57
-
Size
4.6MB
-
Sample
250109-ywcjjazkaz
-
MD5
d12f20d20f23819ef3448bc10873ba57
-
SHA1
961ab360fa4588bcf7494a08914a59f029d8f5e7
-
SHA256
7a5fc736a94166592a370b8b311656517e2df180917bbc61fc688eb7df0915cb
-
SHA512
392d851bda9796a3c351f5b998df90a5e0f1dc116e3ba66f73ad86d254a1d2ca1c526c3f18cd6f4ede626a1fe4001c7e30af021ada55e1adf57d3faa2f624c16
-
SSDEEP
98304:Uq8eNY5p0ExtC6RpPwVsniC5u/BDLTABEp0moOjtchoKCa:Uqup0Ex8ArMdPABEp0pAKhfCa
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d12f20d20f23819ef3448bc10873ba57.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d12f20d20f23819ef3448bc10873ba57.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/K3M6Ljh9fd22.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$TEMP/K3M6Ljh9fd22.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/Selfconvened.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/Selfconvened.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
@zxckostyan4ik
95.181.152.6:46927
-
auth_value
cdf3919a262c0d6ba99116b375d7551c
Targets
-
-
Target
JaffaCakes118_d12f20d20f23819ef3448bc10873ba57
-
Size
4.6MB
-
MD5
d12f20d20f23819ef3448bc10873ba57
-
SHA1
961ab360fa4588bcf7494a08914a59f029d8f5e7
-
SHA256
7a5fc736a94166592a370b8b311656517e2df180917bbc61fc688eb7df0915cb
-
SHA512
392d851bda9796a3c351f5b998df90a5e0f1dc116e3ba66f73ad86d254a1d2ca1c526c3f18cd6f4ede626a1fe4001c7e30af021ada55e1adf57d3faa2f624c16
-
SSDEEP
98304:Uq8eNY5p0ExtC6RpPwVsniC5u/BDLTABEp0moOjtchoKCa:Uqup0Ex8ArMdPABEp0pAKhfCa
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
-
-
Target
$TEMP/K3M6Ljh9fd22.exe
-
Size
881KB
-
MD5
ce5a9ec35a54e669820589d15f1faa07
-
SHA1
68a5aaa46aa2ce2c3083486f8e265e050cd421ac
-
SHA256
a5317940f3f36d4c047ef70fcef5aedcdcdb0d9afae7ccfb3220190f09dab15b
-
SHA512
eb097778c480b9e1bd396895ef86727997cb1c0bd1c3d6863a3d711216c2ce64d1ff647987b57c0e67b9b9673526cd28bc83aaf7177e11a9b348e2960f535131
-
SSDEEP
12288:X7R++fMJpn22QJZu4+miW4C0mk/6K3aY6Lla4+4RWkepjQEppJjZwtGwfi2FsYD5:rRanLQJZu/Bmki6ExdepH7AhEYFpYq
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
-
-
Target
$TEMP/Selfconvened.exe
-
Size
4.5MB
-
MD5
64b5e984fda860eedf19c29a124094fb
-
SHA1
760c195741989e17b48ad52c13bed35e8ea51692
-
SHA256
1f47c67d3baa635c4b7dd2bfed0a26a6bd499c3ab5a64d10b391a52e7d71ba39
-
SHA512
187dbbc7137db41da77dd5c3d1471f82b157d031653109632adb9c49ea519f452b661cfd1845512661dcdb3b00bf2a02b2c3504406fb19ad89b06fcd6afee4e4
-
SSDEEP
98304:xLIWL25lsofrCgl5PmHGjCYv8LHPrVWPa5Qwy:Fslsofuit0bJWPa5QJ
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-