General

  • Target

    JaffaCakes118_f3477ac54b2fd0b905b56c812a6557e2

  • Size

    1.1MB

  • Sample

    250111-brhteswrdx

  • MD5

    f3477ac54b2fd0b905b56c812a6557e2

  • SHA1

    54623ab114604fdc43c0e6b3c341fc44c2447666

  • SHA256

    f61914716a79175c7de3ec3fc18a3bda3e70054fbf2e973641b4983b9b57ab4c

  • SHA512

    5c1679e8c0d4152f293c9e9e37db395baf7fd992cd48862e8049c35764ab400205b56c7cc2af7eaca5508ead47dd291fe7f4861a2d5b7126452cc5cf97c88a3f

  • SSDEEP

    24576:kbTxmHu/2G+2Bkuq6nR3WgTcPUT5sbJUnUQuVTGYjwmAHfT3ZSqWd:kbTxsu/SCWgYPaIUUdjtscd

Malware Config

Extracted

Family

redline

Botnet

@stanfordlzt

C2

185.209.22.181:34925

Attributes
  • auth_value

    5a0918bd3e8ede8e02c8dd9d106a996d

Targets

    • Target

      JaffaCakes118_f3477ac54b2fd0b905b56c812a6557e2

    • Size

      1.1MB

    • MD5

      f3477ac54b2fd0b905b56c812a6557e2

    • SHA1

      54623ab114604fdc43c0e6b3c341fc44c2447666

    • SHA256

      f61914716a79175c7de3ec3fc18a3bda3e70054fbf2e973641b4983b9b57ab4c

    • SHA512

      5c1679e8c0d4152f293c9e9e37db395baf7fd992cd48862e8049c35764ab400205b56c7cc2af7eaca5508ead47dd291fe7f4861a2d5b7126452cc5cf97c88a3f

    • SSDEEP

      24576:kbTxmHu/2G+2Bkuq6nR3WgTcPUT5sbJUnUQuVTGYjwmAHfT3ZSqWd:kbTxsu/SCWgYPaIUUdjtscd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks