Deep Dive Into Redline Stealer

Deep Dive Into Redline Stealer

RedLine is a stealer distributed as cracked games, applications, and services. The malware steals information from web browsers, cryptocurrency wallets, and applications such as FileZilla, Discord, Steam, Telegram, and VPN clients. The binary also gathers data about the infected machine, such as the running processes, antivirus products, installed programs, the Windows product name, the processor architecture, etc. The stealer implements the following actions that extend its functionality: Download, RunPE, DownloadAndEx, OpenLink, and Cmd. The extracted information is converted to the XML format and exfiltrated to the C2 server via SOAP messages. Attackers also use RedLine to deliver ransomware, RATs, Trojans, and miners. RedLine can be obtained for a subscription and costs $100-$200 per month.

The initial file can be downloaded from malware bazaar and unzipped using the password infected

Key Features :

  • Living-off-the-Land Techniques: RedLine leverages legitimate Windows utilities and scripts to carry out its malicious activities, making it difficult to distinguish from normal system behavior.
  • Process Hollowing: It uses process hollowing to inject its malicious code into legitimate processes, evading detection by traditional security solutions.
  • Exfiltration: RedLine employs encryption and disguises its data exfiltration traffic as legitimate network traffic.

Based on Red Canary report on 2023 Redline still exist

alt text

RedLine Stealer Infection Chain
Zip -> LNK PS -> mshta (URL1) -> PS -> cmd -> PS -> URL2 -> exe

redline

After click the file or running the pdf shorcut, we can check the process running on background with procmon

alt text

LNK file to malicious web http://thanhancompany.com/ta/line.hta

alt text

After we check the malicious link towards to website

alt text

Then we check the page source tryn to running VBSCRIPT and execute malicious obfuscated character

alt text