General

  • Target

    JaffaCakes118_ef128d816b35bb51b0e502d1cb85178e

  • Size

    4.6MB

  • Sample

    250110-1lhnxa1ngk

  • MD5

    ef128d816b35bb51b0e502d1cb85178e

  • SHA1

    a7f9d96d5bfdbf86388bc8cad0a6c8758d45b515

  • SHA256

    dd8917276c3d7c626bafa2bb1c415c7199a6bdae1171dcdc75bde0be8f1b5dc9

  • SHA512

    38b08be64764387494fd15543256a27d9c56aa781e984ff50ac9f0de06c3ff56fc89a5f8250ce4942bd5a0aa25b7a22c058f2860dce87cf16d1ebf484d8b483f

  • SSDEEP

    98304:ULR330tEh9OGw8ToI66t8B8rwBBa0L2o7MwNzOxpL318t8Ew1dilM2YvHSUIH:UkEstB9ja0L2SMYqxt3wc2MJM

Malware Config

Extracted

Family

redline

Botnet

@gwwwwrezt1

C2

185.209.22.181:34925

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      JaffaCakes118_ef128d816b35bb51b0e502d1cb85178e

    • Size

      4.6MB

    • MD5

      ef128d816b35bb51b0e502d1cb85178e

    • SHA1

      a7f9d96d5bfdbf86388bc8cad0a6c8758d45b515

    • SHA256

      dd8917276c3d7c626bafa2bb1c415c7199a6bdae1171dcdc75bde0be8f1b5dc9

    • SHA512

      38b08be64764387494fd15543256a27d9c56aa781e984ff50ac9f0de06c3ff56fc89a5f8250ce4942bd5a0aa25b7a22c058f2860dce87cf16d1ebf484d8b483f

    • SSDEEP

      98304:ULR330tEh9OGw8ToI66t8B8rwBBa0L2o7MwNzOxpL318t8Ew1dilM2YvHSUIH:UkEstB9ja0L2SMYqxt3wc2MJM

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks