Tuesday, May 13, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
marketibiza
  • Home
  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
    • Life insurance
    • Insurance Law
    • Travel insurance
  • Contact Us
No Result
View All Result
marketibiza
  • Home
  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
    • Life insurance
    • Insurance Law
    • Travel insurance
  • Contact Us
No Result
View All Result
marketibiza
No Result
View All Result
Home Cyber insurance

Analyzing the notorious infostealer’s backend

admin by admin
2025年4月19日
in Cyber insurance
0
Analyzing the notorious infostealer’s backend
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

You might also like

Pakistani Agency Shipped Fentanyl Analogs, Scams to US – Krebs on Safety

Ransomware Reaches A Report Excessive, However Payouts Are Dwindling

#Infosec2025: Combating Deepfake Threats on the Age of AI Brokers


UPDATE (November 12th, 2024): We clarified the knowledge within the fourth paragraph to higher mirror RedLine’s performance earlier than versus after the takedown.

On October 28th, 2024, the Dutch Nationwide police, alongside the FBI, Eurojust, and a number of other different legislation enforcement organizations, carried out a takedown of the notorious RedLine Stealer malware-as-a-service (MaaS) operation, and its clone referred to as META Stealer. This international effort, named Operation Magnus, resulted within the takedown of three servers within the Netherlands, the seizure of two domains, two individuals being taken into custody in Belgium, and the unsealing of expenses in opposition to one of many alleged perpetrators in america.

Again in April 2023, ESET participated in a partial disruption operation of the RedLine malware, which consisted of the elimination of a number of GitHub repositories used as dead-drop resolvers for the malware’s management panel. Round that point, we investigated beforehand undocumented backend modules of this malware household in collaboration with fellow researchers at Flare. These modules don’t work together immediately with the malware, however fairly deal with authentication and supply performance for the management panel.

Since RedLine has now been taken down, we’re revealing our findings from 2023 publicly, together with some newer discoveries that have been made based mostly on supply code and samples shared with us by the Dutch Nationwide Police.

Observe that the majority of this evaluation was carried out earlier than the takedown. Moreover, there are outdated, cracked copies of the malware which may nonetheless work. That is why we’re describing the RedLine operation as whether it is an ongoing exercise.

Key factors of the blogpost:

  • In 2023, ESET researchers, in collaboration with legislation enforcement, collected a number of modules used to run the infrastructure behind RedLine Stealer.
  • We analyzed these beforehand undocumented modules to offer perception into the interior workings of this malware-as-a-service empire.
  • We have been in a position to determine over 1,000 distinctive IP addresses used to host RedLine management panels.
  • The 2023 variations of RedLine Stealer we investigated intimately used the Home windows Communication Framework for communication between the elements, whereas the newest model from 2024 makes use of a REST API.
  • Based mostly on our evaluation of the supply code and backend samples, we’ve got decided that Redline Stealer and META Stealer share the identical creator.

RedLine Stealer is info stealing malware first found in 2020 by Proofpoint. Somewhat than being centrally operated, RedLine operates on a MaaS mannequin during which anybody should buy a turnkey infostealer resolution from numerous on-line boards and Telegram channels. Purchasers, referred to as associates, can go for a month-to-month subscription, or a lifetime license; in trade for his or her cash, they get a management panel that generates malware samples and acts as a C&C server for them. The generated samples can accumulate a big number of info, together with native cryptocurrency wallets; cookies, saved credentials, and saved bank card particulars from browsers; and saved information from Steam, Discord, Telegram, and numerous desktop VPN functions.

Utilizing a ready-made resolution makes it simpler for the associates to combine RedLine Stealer into bigger campaigns. Some notable examples embrace posing as free downloads of ChatGPT in 2023, and masquerading as online game cheats within the first half of 2024.

Observe on terminology used

 

Due to its MaaS mannequin, any complete dialogue of RedLine will contain a number of totally different elements and layers of community infrastructure. To restrict any doable confusion, we’ll use the next phrases constantly all through the textual content:

  • RedLine malware: The RedLine Stealer malware or a pattern thereof.
  • RedLine panel: GUI management panel used to handle infostealing campaigns.
  • RedLine backend: Assortment of modules that present authentication and performance for the RedLine panel.
  • RedLine: The entire malware operation. This consists of the RedLine malware, the RedLine panel, and the RedLine backend modules.
  • Backend server: A server on which the RedLine backend runs.
  • Sufferer: Entity focused with the RedLine malware.
  • Operator: The person or staff that develops RedLine, sells licenses, and operates the licensing and related backend infrastructure.
  • Affiliate: Entity that operates infostealing campaigns through an occasion of the RedLine panel. They often have a license purchased from the operator, however can also use a cracked model of the panel.

Overview

On this blogpost we doc modules operating on RedLine’s backend servers to offer a better understanding of the internal workings of this MaaS empire. We additionally present some info on the RedLine panel. Determine 1 accommodates a simplified overview of the entire RedLine operation.

Ordinarily, identified samples of RedLine panel distributed to associates are closely packed and virtualized after the primary layer of obfuscation is utilized. However as we have been trying by our telemetry for exercise associated to RedLine Stealer and its panel, we got here throughout an outdated model of the RedLine panel that was solely obfuscated with .NET Reactor, making it a lot simpler to research.

Figure 1. Overview of actors and components involved in RedLine
Determine 1. Overview of actors and elements concerned in RedLine

RedLine’s toolset

All of the elements of RedLine, from the malware itself to the backend authentication server, are written in C# with the .NET framework. The variations we analyzed used the Windows Communication Foundation (WCF) framework to speak with one another. This framework permits one to outline an API utilizing contracts, that are statements utilized to lessons and interfaces to specify how objects and actions are translated between their illustration within the code and the community communications. Thus, applications that work together utilizing this framework should share definitions of those information buildings or lessons. These shared fashions proved helpful in our evaluation of the obfuscated elements.

Observe that the newest 2024 RedLine model makes use of a REST API as a substitute of WCF to speak with the backend.

RedLine panel

This management panel is what associates should buy on boards and Telegram channels. Licenses promote for US$150 per 30 days or US$900 for a lifetime license. In trade for the cash, the associates get a GUI by which they handle their campaigns, with options to configure what info to gather, create malware samples, view and handle collected info, and combine with a Telegram bot to promote stolen info.

The 2023 variations of the panel we investigated have been closely obfuscated utilizing DNGuard, a well known .NET obfuscator, and BoxedApp, a business packer and virtualization library. Fortunately for us, RedLine used the WCF framework so the panel needed to share some lessons and interfaces with different elements. By analyzing these shared parts from the malware and backend elements, that are much less protected, we have been in a position to perceive a number of the panel’s performance regardless of the protections.

All RedLine panels from 2023 have been signed with certificates issued to AMCERT,LLC by Sectigo, which have since been revoked after we reported them. AMCERT,LLC corresponds to an organization registered in Armenia that doesn’t appear to have a web-based presence – fairly uncommon for a purported software program developer.

Authentication

With the intention to use a RedLine panel, associates should first authenticate. Determine 2 exhibits the login immediate.

Figure 2. RedLine panel login prompt
Determine 2. RedLine panel login immediate

The RedLine panels we analyzed use GitHub repositories, just like the one in Determine 3, as dead-drop resolvers for his or her authentication servers. The tackle of this repository is hardcoded within the panel, however it isn’t the identical for all variations of the panel. Discovering and eradicating a number of of those repositories in cooperation with GitHub is what enabled us to quickly disrupt RedLine operations in April 2023. Whereas the elimination didn’t have an effect on the malware’s backend, it compelled the operators to distribute new variations of the panels. For a short time after the disruption, they moved the dead-drop resolvers to Pastebin, earlier than selecting to make use of their very own domains in Might 2023, as described in our joint speak with Flare at Sleuthcon 2023. Within the newest model of the RedLine panel, the risk actors deserted the dead-drop resolvers utterly and easily used a hardcoded URL https://fivto[.]on-line/secure-api/. Extra info on the dead-drop resolvers might be discovered within the Network infrastructure part.

By operating the backend server elements in a digital community, we managed to create affiliate accounts and authenticate with our personal occasion with out having to purchase a subscription.

Figure 3. GitHub repository used as a dead-drop resolver
Determine 3. GitHub repository used as a dead-drop resolver

The primary display screen proven to associates upon logging in, seen in Determine 4, is crammed with advertisements. Whereas we have no idea the precise nature of the advertisements served by the true authentication servers, we have been in a position to create some in our personal occasion of the backend server for demonstration functions. The backend server doesn’t host the precise photographs current in these advertisements, solely their URLs.

Figure 4. Advertisement tab of the RedLine panel
Determine 4. Commercial tab of the RedLine panel with pretend advertisements displayed for demonstration functions

The Black Lists tab permits associates to disregard incoming information by nation, IP tackle, Construct ID, or HWID (a novel ID computed from a sufferer machine’s area identify, username, and serial quantity). Whatever the exclusions chosen right here, samples of RedLine Stealer all include code to stop execution if the locale is about to one of many following international locations: Armenia, Azerbaijan, Belarus, Kazakhstan, Kyrgyzstan, Moldova, Tajikistan, Uzbekistan, Ukraine, and Russia.

The Telegram tab, proven in Determine 5, permits associates to configure a Telegram bot to submit stolen information to particular chats or channels. The affiliate should present a legitimate API token for the bot, after which can choose which entries can be shared based mostly on the nation, Construct ID, OS model, and domains present in cookies or saved logins. The bot may also be configured to share the total logs or solely particular info as outlined within the Message Format discipline, and to share statistics with the chosen recipients (see Determine 6).

Figure 5. Telegram bot configuration in the RedLine panel
Determine 5. Telegram bot configuration within the RedLine panel
Figure 6. Telegram bot code for sharing statistics
Determine 6. Telegram bot code for sharing statistics

Creating malware samples within the entrance finish

The Builder tab, proven in Determine 7, permits associates to create new RedLine Stealer samples by offering a RedLine panel server tackle, a Construct ID, an error message to show, and a picture for use because the icon for the created pattern. These final two are elective, with the picture serving because the icon of the software program RedLine is impersonating, whereas the error message can be utilized to mislead the sufferer as to why the anticipated software wasn’t began.

The Construct ID is used as a marketing campaign identifier and is distributed by the samples together with stolen info. Whereas some previously leaked versions of the RedLine panel included an executable to create builds domestically, in newer variations that is carried out by the backend server. This alteration makes any leaked or cracked RedLine panel a lot much less helpful since associates received’t have the power to create samples to make use of with it. We describe the construct course of within the RedLine.Nodes.LoadBalancer part.

Figure 7. Builder tab of the RedLine panel
Determine 7. Builder tab of the RedLine panel

RedLine backend

The RedLine backend we analyzed in 2023 consists of two modules. The primary one, named RedLine.Nodes.DbController, manages affiliate and commercial information. Regardless of its identify, this module doesn’t use a conventional database, however fairly shops information as Protobuf-encoded objects in particular person recordsdata, with a selected subdirectory for every kind of knowledge. The second module, named RedLine.Nodes.LoadBalancer, features because the server and gives a lot of the performance utilized by the RedLine panel.

We additionally discovered a module referred to as RedLine.MainServer, which might be the ancestor of RedLine.Nodes.DbController and RedLine.Nodes.LoadBalancer. In later variations, it was break up off as a separate module that handles consumer and commercial information.

Within the 2024 model of the backend, DbController and LoadBalancer have been changed by a single module named Nodes.Api.

RedLine.Nodes.DbController

In DbController, affiliate information is represented by a category named ClientData, detailed in Desk 1.

Desk 1. Description of ClientData properties

Attribute Description
ID Distinctive numeric ID.
Login Username.
Password Password.
RegistrationDate Timestamp of the affiliate account’s creation.
Activated Whether or not the affiliate has purchased a license.
LastActive Timestamp of the affiliate’s final exercise.
LastIP IP from which the affiliate’s final exercise occurred. Used along with LastActive to stop authentication if the affiliate’s account was energetic from one other IP tackle within the final 5 minutes.
We imagine that is to stop account sharing.
Premium Unused within the modules we analyzed.
ActivateUntil Expiration timestamp of the affiliate’s license.
BuildKey Distinctive string used to determine samples created by the affiliate.

That is largely easy however presents a couple of fascinating quirks, primarily the way in which passwords and lifelong licenses are dealt with.

Trying on the code used to authenticate associates (proven in Determine 8) makes it apparent that passwords are saved in cleartext. The submitted password is in contrast on to the saved one with none hashing perform being concerned.

Figure 8. Excerpt of the function to handle affiliate logins in DbController
Determine 8. Excerpt of the perform to deal with affiliate logins in DbController

Determine 9 exhibits {that a} lifetime license, which associates should buy for US$900, is represented by setting the expiration date of a given license to any date after 2025. That is alternatively known as a Professional License elsewhere within the code.

Figure 9. Code from the LoadBalancer module
Determine 9. Code from the LoadBalancer module used to examine whether or not an affiliate has a lifetime license

RedLine.Nodes.LoadBalancer

As seen in Determine 10, the LoadBalancer module listens on port 8778. This screenshot additionally exhibits the handlers outlined within the MainPanelService WCF contract. The handlers which can be associated to affiliate and commercial information – specifically OnSignInInternal, OnConnect, OnCheckExpire, and OnGetPartners – delegate requests to the corresponding handler of DbController. The OnCheckConnect handler is utilized by the Redline panel to examine whether or not its C&C server is reachable from the outside. The remainder of the handlers all relate to the creation of malware samples.

Figure 10. Initialization code for the MainPanelService WCF service and its handlers
Determine 10. Initialization code for the MainPanelService WCF service and its handlers
Pattern creation in Redline backend

Because it was first documented in 2020, RedLine Stealer has been rewritten to make use of the WCF framework, and later a REST API, for community communication. As seen in Determine 11, the interior identify for these rewritten variations seems to be RedLine.Reburn.

Figure 11. Code to obtain the path to the RedLine.Reburn solution
Determine 11. Code to acquire the trail to the RedLine.Reburn resolution

To create samples of the RedLine Stealer malware, the OnCreateLastBuild handler proven in Determine 10 makes use of the CreateBuild methodology from the customized VSBuilder class. When a CreateBuild request is acquired, the cleartext password for the affiliate’s account is logged to the console. This exhibits an informal disregard for well-known safety practices.

If within the request no port is specified for the C&C server, the builder defaults to port 6677. When constructing a pattern, the code in Determine 12 is used to derive a token from the marketing campaign’s Construct ID and the affiliate account’s Construct Key. We imagine this corresponds to the worth of the ns1.Authorization header utilized in communication between the samples and panel. This header appears to be utilized by the panel to filter out connections from samples not created by the present account.

Figure 12. Code used to derive token values for RedLine Stealer samples
Determine 12. Code used to derive token values for RedLine Stealer samples

The VSBuilder.CreateBuild methodology makes use of an area C# resolution to create samples. Among the supply recordsdata are learn into reminiscence to switch particular values earlier than being written again to disk. Whereas we have been unable to gather the challenge’s recordsdata, the decompiler output for this methodology together with that of a RedLine Stealer pattern present sufficient context to know that the modified values are:

  • C&C tackle (encrypted),
  • Construct ID (encrypted),
  • pretend error message (encrypted),
  • decryption key,
  • flag to point whether or not to ship stolen info in components or suddenly,
  • authentication token, and
  • meeting identify.

As soon as these values are changed, Visible Studio is invoked to construct the challenge.

If the affiliate has chosen the corresponding possibility, and has a lifetime license, the compiled executable is obfuscated with the commercially out there Babel Obfuscator. Within the 2024 model, obfuscation is applied for all customers and is finished through .NET Reactor as a substitute.

Lastly, a self-signed certificates is generated with the code from Determine 13, and used to signal the executable. The fields of its Distinguished Identify (DN) are crammed with random dictionary phrases. The certificates generated this fashion use the hardcoded password 123321 and have a validity interval extending from seven days earlier than their technology to 10 years after.

Figure 13. Function that generates self-signed certificates with random words in the DN
Determine 13. Operate that generates self-signed certificates with random phrases within the DN

The LoadBalancer module additionally supplied an OnCreateClipper handler. Because the identify suggests, this was used to generate clipboard hijacking malware; on this case, it was used to hijack cryptocurrency transactions by changing pockets addresses within the clipboard with these of attacker-controlled wallets. This performance has been eliminated within the newest variations of the Redline backend.

Apparently, the Builder class additionally contained useless code to generate a malware pattern from a stub executable. We imagine this was a leftover from the strategy used to generate earlier variations of RedLine Stealer. The newest model of the Redline backend doesn’t include the code anymore.

One other handler, named OnSignFile, permits associates with lifetime licenses to signal arbitrary recordsdata with a certificates positioned on the backend server. We have been unable to gather this certificates, however have motive to imagine that it might be the identical certificates used to signal RedLine panels, because it has additionally been used to signal numerous RedLine Stealer and different malware samples. One other doubtless candidate is the certificates with the thumbprint 28F9A8E7601F5338BF6E194151A718608C0124A8, issued to Hangil IT Co., Ltd. This, doubtless stolen, certificates has been used to signal many RedLine Stealer samples and different malicious recordsdata. It has already been revoked.

RedLine.MainServer

The RedLine.MainServer module combines among the performance of the 2 earlier modules with a GUI that enables the admin to simply handle affiliate accounts and commercial information. Regardless of this added performance, a number of components point out that this model of MainServer might be an ancestor of LoadBalancer and DbController fairly than a successor:

  • MainServer samples are compiled with an older model of the .NET framework (4.6.2 vs 4.8).
  • The meeting’s copyright 12 months is 2020 as a substitute of 2021.
  • Some MainServer samples don’t include performance for commercials.
  • The principle WCF service’s contract (MainPanelService) doesn’t embrace the IsAlive handler that’s current in the identical class as LoadBalancer. This handler is utilized by all the newest RedLine panels we’ve got analyzed.

Observe that in later variations of the RedLine backend, the GUI administration panel has been break up off into its personal module additionally named MainServer.

The examined model of the GUI gave us fascinating perception into RedLine administration. It gives a type to create and edit affiliate account information, as proven in Determine 14. The fields correspond to the ClientData class described beforehand.

Figure 14. RedLine MainServer affiliate account management interface
Determine 14. RedLine MainServer affiliate account administration interface

The same type, in Determine 15, exists to handle commercials.

Figure 15. RedLine MainServer advertisement management interface
Determine 15. RedLine MainServer commercial administration interface

Lastly, the rudimentary dashboard in Determine 16 provides the operator an summary of license gross sales.

Figure 16. Statistic dashboard of the MainServer
Determine 16. Statistic dashboard of the MainServer
Nodes.Api

Evaluation of samples shared by Dutch legislation enforcement exhibits that within the newest RedLine variations, the functionalities of the LoadBalancer and DbController modules have been mixed into a brand new one named Nodes.Api. This backend module is packaged as a single-file .NET application and makes use of the WebApplication class from ASP.NET to offer the REST API utilized by the panels. As seen in Determine 17, the module handles requests despatched to each RedLine (fivto[.]on-line) and META (spasshik[.]xyz) servers, displaying that the 2 infostealers share the identical operators.

Figure 17. Code to set up the listener for requests sent to both RedLine and META servers
Determine 17. Code to arrange the listener for requests despatched to each RedLine and META servers

Desk 2 lists the endpoints uncovered by the REST API together with the corresponding WCF handler from earlier variations.

Desk 2. RedLine endpoints

Endpoint Corresponding WCF Handler Description
/api/check N/A Most likely used to check connectivity. This merely returns the worth OK.
/secure-api/sign-in OnSignInInternal Handles logins from the panel.
/secure-api/getBanners OnGetPartners Returns the advertisements to be displayed within the panel.
/secure-api/createFile OnCreateLastBuild Creates an occasion of the stealer malware.
/secure-api/checkConnect OnCheckConnect Pings the required tackle and port to examine whether or not it’s externally reachable.
/secure-api/updateDb N/A Makes the backend reload affiliate information. That is solely performed if the request comes from a loopback tackle.
/edk92hd/createRandom N/A Creates a brand new affiliate entry with a random username and password.
/edk92hd/renew N/A Extends the license validity interval of the required affiliate.
/Panel.zip N/A Returns the Panel.zip file from disk. This password-protected archive accommodates the newest model of the panel.

In contrast to the 2023 variations of the backend we initially analyzed, lifetime licenses now not seem within the code of the brand new module. Since licenses of this sort have been nonetheless being bought, we imagine they have been doubtless dealt with by merely setting their expiration to a date far sooner or later. Performance associated to code signing has additionally been utterly eliminated.

Samples created by the Nodes.Api module are obfuscated utilizing .NET Reactor whether it is current on the hardcoded path C:Program Information (x86)Eziriz.NET ReactordotNET_Reactor.exe. This corresponds to its default set up path.

Past the aforementioned adjustments, options that have been current in older variations behave a lot as they did earlier than. Nevertheless, a few fascinating functionalities have been added.

Affiliate administration

Three endpoints used to handle affiliate information are uncovered. These seem like meant to be used solely by the operator, however that is dealt with in two very other ways. The /secure-api/updateDb endpoint causes the server to reload consumer information from disk. Determine 18 exhibits the replace methodology invoked by the MainServer module at any time when a brand new entry is created or modified. The operation is simply carried out by the Nodes.Api module if the request comes from a loopback tackle, which prevents Panel customers from utilizing it.

Figure 18. Method invoked by the MainServer module
Determine 18. Methodology invoked by the MainServer module

The opposite two endpoints, /edk92hd/createRandom and /edk92hd/renew, use a unique methodology of mitigating unauthorized entry. As seen in Determine 19, they’ll solely be invoked if the request accommodates an sko3s header set to a seemingly random hardcoded worth.

Figure 19. Code for checking whether request contains the correct sko3s header
Determine 19. Code for checking whether or not request accommodates the proper sko3s header
Backups

The opposite fascinating characteristic is the power to again up affiliate information, performance that was lacking within the older variations of the code. Since this information is saved in a collection of recordsdata on disk, the backup is a ZIP archive of the listing that accommodates the recordsdata. This archive is then despatched through Telegram utilizing a hardcoded Chat ID proven in Determine 20.

Figure 20. ZIP archive creation
Determine 20. ZIP archive creation

Hyperlinks with META Stealer

META Stealer is the opposite infostealer disrupted alongside RedLine Stealer. In keeping with an article by Kela, META Stealer was first introduced on cybercrime boards in March 2022. The writer claimed that it used the identical code as RedLine Stealer and supplied the identical performance and panel. META Stealer hasn’t been investigated as completely as RedLine Stealer, however our analysis signifies that the claims it initially made are correct. Based mostly on the supply code, the 2 infostealers are most likely made by the identical individual. Whereas there are some variations, a lot of the code is similar with cases of the string RedLine changed by Meta. As might be seen in Determine 21, the code that’s commented out to be inactive in RedLine is current in META.

Figure 21. RedLine Stealer (left), and META Stealer (right) source code comparison
Determine 21. RedLine Stealer (left), and META Stealer (proper) supply code comparability

As we already talked about, one other piece of proof pointing in the direction of RedLine and META having the identical operators is seen within the code of the Nodes.Api module, which handles requests despatched to each RedLine and META servers, as proven in Determine 17.

We additionally discovered two samples of the META panel signed with a certificates that was additionally used to signal samples of the RedLine panel. This panel used the identical dead-drop resolver schemes, going so far as utilizing the identical AES and RSA keys, solely with a unique GitHub repository. Moreover, as Determine 22 exhibits, a comparability of the panels utilized by META and RedLine reveals solely minor beauty variations.

Figure 22. Panel login prompts for RedLine (top) and META (below)
Determine 22. Panel login prompts for RedLine (high) and META (beneath)

META Stealer makes use of the identical mixture of DNGuard and BoxedApp to guard its panel from evaluation. Nevertheless, META’s authentication course of couldn’t be accomplished when run in opposition to our occasion of the RedLine backend from 2023, so it appears to have been modified from that of RedLine.

Community infrastructure

By parsing samples of RedLine that we detected between November 30th, 2022 and March 23rd, 2023, we have been in a position to determine over 1,000 distinctive IP addresses used to host RedLine panels. Determine 23 exhibits the geographical distribution of those hosted panels. Russia, Germany, and the Netherlands every account for about 20% of the full, whereas Finland and america every characterize round 10%. Despite the fact that this information solely comes from samples focusing on our clients, we imagine it paints a reasonably correct image with reference to the general distribution of the malware.

Figure 23. Heatmap showing the geographical distribution of hosted RedLine panels
Determine 23. Heatmap displaying the geographical distribution of hosted RedLine panels

We have been additionally in a position to determine a number of distinct backend servers. It’s doubtless that there have been extra within the dead-drop resolvers that we couldn’t decrypt. Based mostly on their geographical distribution, proven in Determine 24, the servers are primarily positioned in Russia (a few third of them) whereas the UK, the Netherlands, and the Czech Republic every characterize round 15% of the servers we recognized.

Figure 24. Heatmap showing the geographical distribution of RedLine backend servers
Determine 24. Heatmap displaying the geographical distribution of RedLine backend servers

Useless-drop resolvers

As we already talked about, the 2023 variations of the RedLine panel used GitHub repositories as dead-drop resolvers for its authentication servers. These repositories all contained a file with an encrypted listing of server addresses. The file was encrypted utilizing a customized module merely named RSA. In a single model of this module, proven in Determine 25, the listing was encrypted utilizing AES-CBC with a hardcoded key and IV, and saved to a file named nodesUpdate.config.

Figure 25. EncryptHosts function with hardcoded AES key and IV
Determine 25. EncryptHosts perform with hardcoded AES key and IV

Newer variations, which have been in use at the very least till mid 2024, make use of RSA encryption as a substitute (see Determine 26), with the output written to a file named nodes.config. On this case, the secret’s learn from a file fairly than being hardcoded within the executable. Nevertheless, the category used to carry out RSA encryption can also be current within the LoadBalancer module, with hardcoded default values for the private and non-private keys. Observe the usage of “nodes” once more to seek advice from the backend servers.

Figure 26. RSA encryption and decryption functions with hardcoded default keys
Determine 26. RSA encryption and decryption features with hardcoded default keys

We have now noticed GitHub repositories that include at the very least one such encrypted file. Together with the keys proven above, we have been in a position to extract an RSA personal key from a pattern of the panel. This allowed us to acquire lists of authentication servers, which we shared with legislation enforcement companies.

Conclusion

Earlier than Operation Magnus, RedLine was among the many most widespread of infostealer malware with a really giant variety of associates utilizing its management panel. Nevertheless, the malware-as-a-service enterprise appears to be orchestrated by solely a handful of individuals, a few of whom have been recognized by legislation enforcement.

META Stealer, RedLine Stealer’s clone and most likely created by the identical risk actors, made its entry into the sphere in 2022. It doesn’t seem like a successor to RedLine, for the reason that improvement of each households has continued in parallel. It was taken down alongside RedLine Stealer.

Our in-depth evaluation of the behind-the-scenes components of RedLine – its management panel and backend – hopefully gives a extra holistic understanding of this risk.

For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at [email protected]. 
ESET Analysis gives personal APT intelligence reviews and information feeds. For any inquiries about this service, go to the ESET Threat Intelligence web page.

IoCs

A complete listing of indicators of compromise (IoCs) and samples might be present in our GitHub repository.

Information

SHA-1 Filename Detection Description
1AD92153B56FC0B39F8FCEC949241EC42C22FA54 Nodes.Api.exe N/A RedLine backend single-file software.
8A0CAFE86C0774F1D9C7F198505AE15D04447DD6 MainServer.exe N/A RedLine backend consumer and commercial administration module (2024 model).
607DBA5F630A1DBFF0E13EEBA2730AB9AB2FB253 Nodes.Api.dll N/A RedLine backend important module.
FB3ABAC1FAC852AE6D22B7C4843A04CE75B65663 Panel.exe MSIL/Spy.RedLine.O META stealer panel (2024 model).
EE153B3F9B190B1492DEFBB1C70830A28F7C41B2 RedLine.MainPanel.exe MSIL/Spy.RedLine.H RedLine stealer panel (2024 model).
1AB006B1C5403BA4648059DF93B6DAEB0E3EC43F Panel.exe MSIL/Spy.RedLine.O RedLine stealer panel (2024 model).
DC3A236245AE8C4D5D079E429ED6B77A5B5245C2 RedLine.MainServer.exe N/A RedLine backend licensing server GUI.
06A2A900561C122F45088A5EAE9146F7675C63F6 rsa.exe N/A Software to encrypt the listing of C&C servers.
1626F2666782710FC28D4AFE607C7BE54F1FC67F RedLine.Nodes.LoadBalancer.exe N/A RedLine backend server module.
37D1221CE6BB82E7AD08FD22BD13592815A23468 RedLine.SharedModels.dll MSIL/Spy.RedLine.Ok RedLine WCF fashions and contracts definitions.
66C0E7E74C593196E0925A7B654E09258E3B1FB7 Panel.exe Win32/GenCBL.ATC RedLine panel (v22.4).
2E5D9F2ED82C81609F4C49EA31642B1FB5FC11B5 RedLine.MainPanel.exe MSIL/Spy.RedLine.H RedLine panel (non-virtualized).
47B78A5698A289C73175C5C69786DE40C7C93C12 RedLine.SharedModels.dll MSIL/Spy.RedLine.J RedLine fashions and contracts definitions.
49BE1D7C87AC919BB9083FA87F7B907E5F2C9835 Panel.exe MSIL/Spy.RedLine.H META Stealer Panel.
4BF4D42EED7FCA8FD52863B7020AC646EC6D97E9 RedLine.Nodes.DbController.exe N/A RedLine backend server consumer and commercial administration module.
27BD472729439D5B8814D4A8A464AF9832198894 Panel.exe MSIL/Spy.RedLine.H RedLine panel (v26).
A154DFAEDC237C047F419EB6884DAB1EF4E2A17D Panel.exe MSIL/Spy.RedLine.H RedLine Panel (leaked cracked model).

Community

Observe that the domains within the desk beneath have been seized by legislation enforcement. The opposite panel and server addresses that we collected have been shared with legislation enforcement companies frequently to assist in their actions and are now not energetic.

IP Area Internet hosting supplier First seen Particulars
N/A spasshik[.]xyz N/A 2024⁠-⁠06⁠-⁠02 META backend REST server.
N/A fivto[.]on-line N/A 2024⁠-⁠08⁠-⁠03 RedLine backend REST server.

MITRE ATT&CK strategies

This desk was constructed utilizing version 15 of the MITRE ATT&CK framework.

Tactic ID Identify Description
Useful resource Improvement T1583.003 Purchase Infrastructure: Digital Non-public Server Cases of the RedLine again finish are hosted on leased digital personal servers.
T1583.004 Purchase Infrastructure: Server Cases of the RedLine again finish are hosted on servers that seem like unique to RedLine.
T1587.001 Purchase Infrastructure: Net Providers Operators of RedLine have created a number of GitHub accounts and repositories.
T1587.002 Develop Capabilities: Malware Operators of RedLine have developed their very own malware households, management panels, and back-end servers.
T1588.003 Develop Capabilities: Code Signing Certificates The RedLine again finish routinely generates self-signed certificates when creating samples.
T1608.002 Receive Capabilities: Code Signing Certificates RedLine panels are signed with legitimate certificates issued to AMCERT,LLC.
T1608.001 Stage Capabilities: Add Malware Again-end elements of RedLine are uploaded to non-public servers.
Protection Evasion T1622 Debugger Evasion The RedLine panel routinely terminates itself if it detects a debugger or evaluation instruments.
T1027.002 Obfuscated Information or Info: Software program Packing Samples of the RedLine panel are packed utilizing DNGuard and BoxedApp.
Command and Management T1132.001 Knowledge Encoding: Normal Encoding RedLine makes intensive use of base64 encoding in its community communications.
Community communication makes use of the usual binary encoder of the WCF framework.
T1573.001 Encrypted Channel: Symmetric Cryptography Communications between the panel and back-end server use AES encryption.
In some circumstances, dead-drop resolver content material is encrypted with AES-CBC.
T1573.002 Encrypted Channel: Uneven Cryptography Communications between the panel and back-end server use RSA encryption.
In some circumstances, dead-drop resolver content material is encrypted with RSA.
T1071.001 Utility Layer Protocol: Net Protocols Community communication in latest variations is finished through a REST API over HTTPS.
T1095 Non-Utility Layer Protocol Community communication is finished with the WCF Framework over TCP.
T1102.001 Net Service: Useless Drop Resolver The RedLine panel makes use of GitHub repositories as dead-drop resolvers to acquire the tackle of back-end servers.
T1571 Non-Normal Port By default, the RedLine panel’s Visitor Hyperlinks performance runs an HTTP server on port 7766.

Share30Tweet19
admin

admin

Recommended For You

Pakistani Agency Shipped Fentanyl Analogs, Scams to US – Krebs on Safety

by admin
2025年5月13日
0
Pakistani Agency Shipped Fentanyl Analogs, Scams to US – Krebs on Safety

A Texas agency just lately charged with conspiring to distribute artificial opioids in america is on the heart of an unlimited community of corporations within the U.S. and...

Read more

Ransomware Reaches A Report Excessive, However Payouts Are Dwindling

by admin
2025年5月12日
0
Ransomware Reaches A Report Excessive, However Payouts Are Dwindling

Shed a tear, should you can, for the poor, misunderstood cybercriminals laborious at work making an attempt to earn a dishonest crust by infecting organisations with ransomware.Newly launched...

Read more

#Infosec2025: Combating Deepfake Threats on the Age of AI Brokers

by admin
2025年5月12日
0
#Infosec2025: Combating Deepfake Threats on the Age of AI Brokers

After years of generative AI adoption, the thrill has waned and attackers and defenders alike are working arduous to combine AI-powered instruments into real-world use circumstances. Decreasing the...

Read more

My data was stolen. Now what?

by admin
2025年5月11日
0
My data was stolen. Now what?

Again in Might 2023, I wrote the blogpost You may not care where you download software from, but malware does as a name to arms, warning in regards...

Read more

Cisco Patches CVE-2025-20188 In IOS XE Wi-fi Controller

by admin
2025年5月11日
0
Cisco Patches CVE-2025-20188 In IOS XE Wi-fi Controller

Cisco has rolled out software program patches to deal with a extreme safety vulnerability, tracked as CVE-2025-20188, in its IOS XE Wi-fi Controller software program. The flaw, which...

Read more
Next Post
Allstate Broadcasts Redemption of Collection G Most popular Inventory

March 2025 Month-to-month Launch | Allstate Newsroom

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Browse by Category

  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
  • Insurance Law
  • Life insurance
  • Travel insurance

Trending News

Pakistani Agency Shipped Fentanyl Analogs, Scams to US – Krebs on Safety

Pakistani Agency Shipped Fentanyl Analogs, Scams to US – Krebs on Safety

2025年5月13日
Tenth Circuit backs AdHealth in $40 million dispute over extra insurance coverage protection for hospital ster

Tenth Circuit backs AdHealth in $40 million dispute over extra insurance coverage protection for hospital ster

2025年5月12日
Ransomware Reaches A Report Excessive, However Payouts Are Dwindling

Ransomware Reaches A Report Excessive, However Payouts Are Dwindling

2025年5月12日
Quantifying and Defending Invisible Labor

Quantifying and Defending Invisible Labor

2025年5月12日
Hub Worldwide acquires Demarie Insurance coverage

Hub Worldwide acquires Demarie Insurance coverage

2025年5月12日
#Infosec2025: Combating Deepfake Threats on the Age of AI Brokers

#Infosec2025: Combating Deepfake Threats on the Age of AI Brokers

2025年5月12日
A Deep Dive into Retirement Portfolio Safety • The Insurance coverage Professional Weblog

A Deep Dive into Retirement Portfolio Safety • The Insurance coverage Professional Weblog

2025年5月12日

Market Biz

Welcome to Marketi Biza The goal of Marketi Biza is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

CATEGORIES

  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
  • Insurance Law
  • Life insurance
  • Travel insurance

Recent News

Pakistani Agency Shipped Fentanyl Analogs, Scams to US – Krebs on Safety

Pakistani Agency Shipped Fentanyl Analogs, Scams to US – Krebs on Safety

2025年5月13日
Tenth Circuit backs AdHealth in $40 million dispute over extra insurance coverage protection for hospital ster

Tenth Circuit backs AdHealth in $40 million dispute over extra insurance coverage protection for hospital ster

2025年5月12日
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Copyright © 2023 Market Biz All Rights Reserved.

No Result
View All Result
  • Home
  • Auto insurance
  • Business insurance
  • Cyber insurance
  • Disability insurance
  • Health insurance
  • Insurance Law
  • Life insurance
  • Travel insurance
  • Contact Us

Copyright © 2023 Market Biz All Rights Reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?