Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 01:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f3a79938941434dc0b9de9e11ec309aa.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f3a79938941434dc0b9de9e11ec309aa.exe
-
Size
366KB
-
MD5
f3a79938941434dc0b9de9e11ec309aa
-
SHA1
768d4379fb5c15782f046e79ebef9fc09130589a
-
SHA256
958743b7b9dcbc19fb81a59f4afc8e2385c6b78dd255670c3fb394f0bab16ed6
-
SHA512
1def364da9dbd4fcc7ec064d514d96dd60b14e22e2eb6f75f62bcd6e80a8c1a4a39f00b50bb1f541f45c52bd5a1d62666a55ec09ac4e0f090e005c9d6103d796
-
SSDEEP
6144:5YLR+KpZ0+3mmknEoGaCNNRa6O/KDCW/gc8TNQ5:OV+KP3mNG/Nva6O/Kd/gc8hQ
Malware Config
Extracted
redline
shop
45.9.20.107:46187
-
auth_value
60c75f1e2d31f6bac6dd7edad67d8615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2712-4-0x0000000003110000-0x0000000003134000-memory.dmp family_redline behavioral1/memory/2712-5-0x0000000003130000-0x0000000003152000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2712-4-0x0000000003110000-0x0000000003134000-memory.dmp family_sectoprat behavioral1/memory/2712-5-0x0000000003130000-0x0000000003152000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f3a79938941434dc0b9de9e11ec309aa.exe