General
-
Target
JaffaCakes118_f9262caed7ba0fc77e871e26d9a5b4eb
-
Size
4.6MB
-
Sample
250111-gy4x5ayjay
-
MD5
f9262caed7ba0fc77e871e26d9a5b4eb
-
SHA1
5455ad3b1de9eee55ec776d0e220bdf8488ff7d1
-
SHA256
fafa2c77937e7b14af1d156fd7a188c74833f34a45ceb8ce241c7c991e1dea58
-
SHA512
d2aca65022e175d2f01e624bf3b07158354262d1355b488d453fd5e9482a262cdddf9d546ca2270c63745ee24cab84f373cf285a8ef644c3b459b24088d2501c
-
SSDEEP
98304:/q8eNY5p0ExtC6RpPwVsniC5u/BDLTABEp0moOjtchG8cV:/qup0Ex8ArMdPABEp0pAKhGVV
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f9262caed7ba0fc77e871e26d9a5b4eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9262caed7ba0fc77e871e26d9a5b4eb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/Selfconvened.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$TEMP/Selfconvened.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/qT5w4MkRQwNB.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$TEMP/qT5w4MkRQwNB.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
@hatake03
95.181.152.6:46927
-
auth_value
cdf3919a262c0d6ba99116b375d7551c
Targets
-
-
Target
JaffaCakes118_f9262caed7ba0fc77e871e26d9a5b4eb
-
Size
4.6MB
-
MD5
f9262caed7ba0fc77e871e26d9a5b4eb
-
SHA1
5455ad3b1de9eee55ec776d0e220bdf8488ff7d1
-
SHA256
fafa2c77937e7b14af1d156fd7a188c74833f34a45ceb8ce241c7c991e1dea58
-
SHA512
d2aca65022e175d2f01e624bf3b07158354262d1355b488d453fd5e9482a262cdddf9d546ca2270c63745ee24cab84f373cf285a8ef644c3b459b24088d2501c
-
SSDEEP
98304:/q8eNY5p0ExtC6RpPwVsniC5u/BDLTABEp0moOjtchG8cV:/qup0Ex8ArMdPABEp0pAKhGVV
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
-
-
Target
$TEMP/Selfconvened.exe
-
Size
4.5MB
-
MD5
64b5e984fda860eedf19c29a124094fb
-
SHA1
760c195741989e17b48ad52c13bed35e8ea51692
-
SHA256
1f47c67d3baa635c4b7dd2bfed0a26a6bd499c3ab5a64d10b391a52e7d71ba39
-
SHA512
187dbbc7137db41da77dd5c3d1471f82b157d031653109632adb9c49ea519f452b661cfd1845512661dcdb3b00bf2a02b2c3504406fb19ad89b06fcd6afee4e4
-
SSDEEP
98304:xLIWL25lsofrCgl5PmHGjCYv8LHPrVWPa5Qwy:Fslsofuit0bJWPa5QJ
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
-
-
Target
$TEMP/qT5w4MkRQwNB.exe
-
Size
836KB
-
MD5
b1053be5f3586f6785a57c911addc48c
-
SHA1
712b1ed92154916d48d20476cf7ff12da0c57609
-
SHA256
e0c190537e74cb9253f2bf68203513de2a258ef427dbff8552310d8767adf71c
-
SHA512
1d5b0f9c40ea2796b65835e11b1dff542d38607558dd903a922a3dea0f5e3ac117b6dcb597710d5c36851e737b1dce8069b94cff87b18c517928bcc9645eb7f4
-
SSDEEP
12288:8TxETvPX2P3+6OCKLSx/XH5Zf6Rhcar4+QR5cepnSCdeTnEFMwuOqjYd:w+Tv+PO6OsxPTM94TSCdeKMwqjYd
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-