Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 01:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f3a79938941434dc0b9de9e11ec309aa.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f3a79938941434dc0b9de9e11ec309aa.exe
-
Size
366KB
-
MD5
f3a79938941434dc0b9de9e11ec309aa
-
SHA1
768d4379fb5c15782f046e79ebef9fc09130589a
-
SHA256
958743b7b9dcbc19fb81a59f4afc8e2385c6b78dd255670c3fb394f0bab16ed6
-
SHA512
1def364da9dbd4fcc7ec064d514d96dd60b14e22e2eb6f75f62bcd6e80a8c1a4a39f00b50bb1f541f45c52bd5a1d62666a55ec09ac4e0f090e005c9d6103d796
-
SSDEEP
6144:5YLR+KpZ0+3mmknEoGaCNNRa6O/KDCW/gc8TNQ5:OV+KP3mNG/Nva6O/Kd/gc8hQ
Malware Config
Extracted
redline
shop
45.9.20.107:46187
-
auth_value
60c75f1e2d31f6bac6dd7edad67d8615
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/3424-4-0x00000000035A0000-0x00000000035C4000-memory.dmp family_redline behavioral2/memory/3424-7-0x0000000003700000-0x0000000003722000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/3424-4-0x00000000035A0000-0x00000000035C4000-memory.dmp family_sectoprat behavioral2/memory/3424-7-0x0000000003700000-0x0000000003722000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f3a79938941434dc0b9de9e11ec309aa.exe