General

  • Target

    JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1

  • Size

    396KB

  • Sample

    250110-wvyz2a1qhy

  • MD5

    eacbae9bdaa559182cf794986c6a10c1

  • SHA1

    6943b0ec8e128dd473010269b50b494b2cea1401

  • SHA256

    6c35facea27417051d4ffccbffd9a353ce00b548b50944d3ef4a246298c037f1

  • SHA512

    205b8b8c25ee6cab96a435bc4b9d4eb785c6824cf45ad6bb8d5d851f9dbd43afd313ed029c762a30559d4cdabba49a797ce48778e0fb312e91a479a238459bed

  • SSDEEP

    6144:olHxrJ4N/xM5UKJmIf3OTCU+cENbB30A4PzE:IpJUskIm2PBz

Malware Config

Extracted

Family

redline

Botnet

wincode

C2

4life.longmusic.com:6640

Targets

    • Target

      JaffaCakes118_eacbae9bdaa559182cf794986c6a10c1

    • Size

      396KB

    • MD5

      eacbae9bdaa559182cf794986c6a10c1

    • SHA1

      6943b0ec8e128dd473010269b50b494b2cea1401

    • SHA256

      6c35facea27417051d4ffccbffd9a353ce00b548b50944d3ef4a246298c037f1

    • SHA512

      205b8b8c25ee6cab96a435bc4b9d4eb785c6824cf45ad6bb8d5d851f9dbd43afd313ed029c762a30559d4cdabba49a797ce48778e0fb312e91a479a238459bed

    • SSDEEP

      6144:olHxrJ4N/xM5UKJmIf3OTCU+cENbB30A4PzE:IpJUskIm2PBz

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks