General
-
Target
JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5
-
Size
4.6MB
-
Sample
250110-27bcdsvlhq
-
MD5
f0c79126c7a4dc930ea4e1e4e09017b5
-
SHA1
a47859bef56c268a88405370d9c2556d5a4fb253
-
SHA256
2fa3a2a8cef5c47f46af13eb11cd421f9793a0cba77d8df53c05ff5ead488ee0
-
SHA512
1793661b774bed282551d960653999f65196f03e1bf4360821a08a9b270337b20cdeb998acbb1367c4557c985ca2aec23022f267ec89bdebe3934e004c736769
-
SSDEEP
98304:ALO9E237GJYUl1fe84qbxuGOlg3fD9TY08MsTH1WS3Op:bL2J1u/esTUsw
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5.exe
Resource
win7-20240903-en
Malware Config
Extracted
redline
@Bibiskop
176.57.69.148:43862
Targets
-
-
Target
JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5
-
Size
4.6MB
-
MD5
f0c79126c7a4dc930ea4e1e4e09017b5
-
SHA1
a47859bef56c268a88405370d9c2556d5a4fb253
-
SHA256
2fa3a2a8cef5c47f46af13eb11cd421f9793a0cba77d8df53c05ff5ead488ee0
-
SHA512
1793661b774bed282551d960653999f65196f03e1bf4360821a08a9b270337b20cdeb998acbb1367c4557c985ca2aec23022f267ec89bdebe3934e004c736769
-
SSDEEP
98304:ALO9E237GJYUl1fe84qbxuGOlg3fD9TY08MsTH1WS3Op:bL2J1u/esTUsw
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-