General

  • Target

    JaffaCakes118_da225d3c54e4efff77a76d42ebc7ddd5

  • Size

    4.6MB

  • Sample

    250110-ecsxma1kfw

  • MD5

    da225d3c54e4efff77a76d42ebc7ddd5

  • SHA1

    19b993c2b46236ae0a7c7c8c0d359ec9a1bcac8e

  • SHA256

    73ede485d30a91c88bfc83b5a77db2c2f76c30d189e36caac576adfaf5e2aa6e

  • SHA512

    f5c7e54f4518e953a90c0a06efe6166b0311494f5b5728fb931f32e91477d8b00f56ba100f1b36671083a87ed7d682dd39f18de79fde009d2700f2dbfd953aea

  • SSDEEP

    98304:PLeA7lUGZBC4WjsZXaj2UCga4DgP8wwN7eGvAxr1yjf1IKgfuiAgaD:FBC4WoMjS4DgPK1ErU5B

Malware Config

Extracted

Family

redline

Botnet

832304211

C2

94.26.248.120:63731

Attributes
  • auth_value

    ee8187fd574be73a935e073f8b5705eb

Targets

    • Target

      JaffaCakes118_da225d3c54e4efff77a76d42ebc7ddd5

    • Size

      4.6MB

    • MD5

      da225d3c54e4efff77a76d42ebc7ddd5

    • SHA1

      19b993c2b46236ae0a7c7c8c0d359ec9a1bcac8e

    • SHA256

      73ede485d30a91c88bfc83b5a77db2c2f76c30d189e36caac576adfaf5e2aa6e

    • SHA512

      f5c7e54f4518e953a90c0a06efe6166b0311494f5b5728fb931f32e91477d8b00f56ba100f1b36671083a87ed7d682dd39f18de79fde009d2700f2dbfd953aea

    • SSDEEP

      98304:PLeA7lUGZBC4WjsZXaj2UCga4DgP8wwN7eGvAxr1yjf1IKgfuiAgaD:FBC4WoMjS4DgPK1ErU5B

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks