General

  • Target

    JaffaCakes118_df3a05f419ab5ae3cb39f78aab24f821

  • Size

    152KB

  • Sample

    250110-j1z33azqfj

  • MD5

    df3a05f419ab5ae3cb39f78aab24f821

  • SHA1

    0603fd64820d1d559bb35919a2980d0a4e632bef

  • SHA256

    755d581cbfcd526acdd1855fe76e542a27ea8081b3830fa7488fd72f74962d28

  • SHA512

    e7e1319b34781bbeed7351c1dfdb8d1d99219d6d2a597ed5a7eeee7f8c9a99da255071869906844071eb91ea343e9ef44e0fc56cd0c400c886f84be45cc53ad9

  • SSDEEP

    3072:w2MfmQK1IVi4j6WM/Zfgv6J6INEybZo+PUmm+mf3hW2pUt1GcsEC8:rMfm6U4j63ea6Zyb7UL+mriT/

Malware Config

Extracted

Family

redline

C2

65.108.29.210:21638

Attributes
  • auth_value

    ad39d6a8ea7823f2a92f57ebaa4c98a5

Targets

    • Target

      JaffaCakes118_df3a05f419ab5ae3cb39f78aab24f821

    • Size

      152KB

    • MD5

      df3a05f419ab5ae3cb39f78aab24f821

    • SHA1

      0603fd64820d1d559bb35919a2980d0a4e632bef

    • SHA256

      755d581cbfcd526acdd1855fe76e542a27ea8081b3830fa7488fd72f74962d28

    • SHA512

      e7e1319b34781bbeed7351c1dfdb8d1d99219d6d2a597ed5a7eeee7f8c9a99da255071869906844071eb91ea343e9ef44e0fc56cd0c400c886f84be45cc53ad9

    • SSDEEP

      3072:w2MfmQK1IVi4j6WM/Zfgv6J6INEybZo+PUmm+mf3hW2pUt1GcsEC8:rMfm6U4j63ea6Zyb7UL+mriT/

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks