Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 06:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dd77412557cfbfebe8b16ed0fce69ab3.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_dd77412557cfbfebe8b16ed0fce69ab3.exe
-
Size
336KB
-
MD5
dd77412557cfbfebe8b16ed0fce69ab3
-
SHA1
d2e128a711f24a4f705addac81f9c2ff341ccfbf
-
SHA256
7ecaca6f4be593855ebd927eb0330f3aab210e313b449278af58b24465106031
-
SHA512
9094b22cd3347a04e09454c48f8991e15b76519ea8390065162ab0999017dd4f541bfa2b75ace1b286ea5f230a04cd1204c503a5c1c16df97149b66d277d3b87
-
SSDEEP
6144:PolDPnLGnEIDaivp9R/Pjn5yNoWA4J7uuUAs5mxzAQq/s/5U:PoNFIDaiFTLD4J7uuUAdxzA0
Malware Config
Extracted
redline
UDP
45.9.20.182:52236
-
auth_value
a272f3a2850ec3dccdaed97234b7c40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2564-4-0x0000000000840000-0x0000000000864000-memory.dmp family_redline behavioral1/memory/2564-5-0x0000000002070000-0x0000000002092000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2564-4-0x0000000000840000-0x0000000000864000-memory.dmp family_sectoprat behavioral1/memory/2564-5-0x0000000002070000-0x0000000002092000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dd77412557cfbfebe8b16ed0fce69ab3.exe