General

  • Target

    JaffaCakes118_f0b84e8bd74a6e1a1bb8c80b12f2f395

  • Size

    4.7MB

  • Sample

    250110-25z8qsskh1

  • MD5

    f0b84e8bd74a6e1a1bb8c80b12f2f395

  • SHA1

    477ba908394647b0b80dad624df631a72abccd7e

  • SHA256

    6d1c904dcc026effe0a402ac13d2f226c97e173f967f6b9b3325a8dfb222f0a2

  • SHA512

    fae9780fc5caa7ecdf49f13d72b1a6e072f9db953cc82ffadb5058366724626326e37f6cf71325f3b414e65eaee25aa37e691cde280511f71fbbb9914ce1b694

  • SSDEEP

    98304:fLNbMI/xQ0hN4iVRolZfmzzGZSNxyzpisAhFwO7VwXWL6Vrh3:Bm0D4iPolUNIAsO7IWL6BV

Malware Config

Extracted

Family

redline

Botnet

@qtrxn

C2

185.209.22.181:34925

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      JaffaCakes118_f0b84e8bd74a6e1a1bb8c80b12f2f395

    • Size

      4.7MB

    • MD5

      f0b84e8bd74a6e1a1bb8c80b12f2f395

    • SHA1

      477ba908394647b0b80dad624df631a72abccd7e

    • SHA256

      6d1c904dcc026effe0a402ac13d2f226c97e173f967f6b9b3325a8dfb222f0a2

    • SHA512

      fae9780fc5caa7ecdf49f13d72b1a6e072f9db953cc82ffadb5058366724626326e37f6cf71325f3b414e65eaee25aa37e691cde280511f71fbbb9914ce1b694

    • SSDEEP

      98304:fLNbMI/xQ0hN4iVRolZfmzzGZSNxyzpisAhFwO7VwXWL6Vrh3:Bm0D4iPolUNIAsO7IWL6BV

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks