General

  • Target

    716f6379cc32afb03ef2639b14e32b4df5538b99b84dafe355b39f8934e7c740

  • Size

    505KB

  • Sample

    231013-fppamseh5z

  • MD5

    3082e7832f7a31397990d4d3ae4c75c9

  • SHA1

    769b150e219c7e8d7221f7a0f0ba6ef617fd036d

  • SHA256

    716f6379cc32afb03ef2639b14e32b4df5538b99b84dafe355b39f8934e7c740

  • SHA512

    8e371f4b075070daf8efb449ab87d923eb4d3cad74d7c9c3d3cef76f43f268c0e4aabe6fa1f801e20ac49e25f9bac70338044fbe9bd408883429ca34fb98ade4

  • SSDEEP

    6144:Y52GLrQ8WKhR14o4XQQDTpXIvh+TodRV64apJN9wLOM21H:2DLrPWKhR1Ul45+TsX64a2iH

Malware Config

Extracted

Family

stealc

C2

http://85.209.11.51

Attributes
  • url_path

    /fefb4a458e1dc58b.php

rc4.plain

Targets

    • Target

      716f6379cc32afb03ef2639b14e32b4df5538b99b84dafe355b39f8934e7c740

    • Size

      505KB

    • MD5

      3082e7832f7a31397990d4d3ae4c75c9

    • SHA1

      769b150e219c7e8d7221f7a0f0ba6ef617fd036d

    • SHA256

      716f6379cc32afb03ef2639b14e32b4df5538b99b84dafe355b39f8934e7c740

    • SHA512

      8e371f4b075070daf8efb449ab87d923eb4d3cad74d7c9c3d3cef76f43f268c0e4aabe6fa1f801e20ac49e25f9bac70338044fbe9bd408883429ca34fb98ade4

    • SSDEEP

      6144:Y52GLrQ8WKhR14o4XQQDTpXIvh+TodRV64apJN9wLOM21H:2DLrPWKhR1Ul45+TsX64a2iH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks