General

  • Target

    JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5

  • Size

    4.6MB

  • Sample

    250110-27bcdsvlhq

  • MD5

    f0c79126c7a4dc930ea4e1e4e09017b5

  • SHA1

    a47859bef56c268a88405370d9c2556d5a4fb253

  • SHA256

    2fa3a2a8cef5c47f46af13eb11cd421f9793a0cba77d8df53c05ff5ead488ee0

  • SHA512

    1793661b774bed282551d960653999f65196f03e1bf4360821a08a9b270337b20cdeb998acbb1367c4557c985ca2aec23022f267ec89bdebe3934e004c736769

  • SSDEEP

    98304:ALO9E237GJYUl1fe84qbxuGOlg3fD9TY08MsTH1WS3Op:bL2J1u/esTUsw

Malware Config

Extracted

Family

redline

Botnet

@Bibiskop

C2

176.57.69.148:43862

Targets

    • Target

      JaffaCakes118_f0c79126c7a4dc930ea4e1e4e09017b5

    • Size

      4.6MB

    • MD5

      f0c79126c7a4dc930ea4e1e4e09017b5

    • SHA1

      a47859bef56c268a88405370d9c2556d5a4fb253

    • SHA256

      2fa3a2a8cef5c47f46af13eb11cd421f9793a0cba77d8df53c05ff5ead488ee0

    • SHA512

      1793661b774bed282551d960653999f65196f03e1bf4360821a08a9b270337b20cdeb998acbb1367c4557c985ca2aec23022f267ec89bdebe3934e004c736769

    • SSDEEP

      98304:ALO9E237GJYUl1fe84qbxuGOlg3fD9TY08MsTH1WS3Op:bL2J1u/esTUsw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks