General

  • Target

    JaffaCakes118_ee1952aee5da5ff280bc04a22a18146d

  • Size

    4.7MB

  • Sample

    250110-zr6r9azkcm

  • MD5

    ee1952aee5da5ff280bc04a22a18146d

  • SHA1

    e1722a2efb52d94025ef0302ff0c805b1ca1d905

  • SHA256

    09b91cd1e08d99e06718089bf71b2afaf8502f506fc8bc316fc27765ecc5913f

  • SHA512

    5cd3018639498f775f8e2ce2d7dd3fe28bf4ad918fc923385a15d2db8e4c798b0b4cc8a7eead4514a13306e79ebdeea8781a1fcf12e6624b3c742ac968b9a22a

  • SSDEEP

    98304:RLmFpNOglZd78RFipMMCeUkgjsKZ+jihA5h0yBcsg9PihNNgVNL72QziUsCCt:Mzx/5VUkgjvcihdsgMhNNgVd7zQd

Malware Config

Extracted

Family

redline

Botnet

@bo0tlegger

C2

185.209.22.181:34925

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      JaffaCakes118_ee1952aee5da5ff280bc04a22a18146d

    • Size

      4.7MB

    • MD5

      ee1952aee5da5ff280bc04a22a18146d

    • SHA1

      e1722a2efb52d94025ef0302ff0c805b1ca1d905

    • SHA256

      09b91cd1e08d99e06718089bf71b2afaf8502f506fc8bc316fc27765ecc5913f

    • SHA512

      5cd3018639498f775f8e2ce2d7dd3fe28bf4ad918fc923385a15d2db8e4c798b0b4cc8a7eead4514a13306e79ebdeea8781a1fcf12e6624b3c742ac968b9a22a

    • SSDEEP

      98304:RLmFpNOglZd78RFipMMCeUkgjsKZ+jihA5h0yBcsg9PihNNgVNL72QziUsCCt:Mzx/5VUkgjvcihdsgMhNNgVd7zQd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks