

Rewterz Threat Alert – Dridex Banking Trojan – Active IOCs
April 19, 2022
Managed SOC Vs Managed XDR — Part 2
April 19, 2022
Rewterz Threat Alert – Dridex Banking Trojan – Active IOCs
April 19, 2022
Managed SOC Vs Managed XDR — Part 2
April 19, 2022Severity
High
Analysis Summary
Redline is an info stealer malware that steals information from web browsers and has the ability to corrupt operating systems by installing harmful software. It steals user information from browsers, instant messaging applications, and file transfer protocol clients. According to the Proofpoint analysis, the malware first appeared in March 2020. Redline expanded throughout several nations during the COVID-19 epidemic and is still active today. Passwords, credit card information, cookies, usernames, locations, autofill data, and even hardware configuration such as keyboard layout, UAC settings can be stolen by RedLine. RedLine is also capable of stealing cryptocurrency. This malware is a live campaign that is aimed at a variety of Asian organizations.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
- dc102e44ff9584479e97ed6b0c2cbb6f
- 8043f3f979a549dc05a500c90904a6f5
- b09ecdc2e54120e180a5b082d844a0b2
- a6400d30c1171d82382ac9802fed0671
- 814a534e8a7f5657ce9c478baae64347
- d3b673df9decd0cb204edabb4dd46f3a
- 690c0f53e472801ec6635d8e60f75af
SHA-256
- 2aa81d29228233060fc8724f1aff157997a4238af33964f7415b3445e2a950dc
- 3effabbb9b475d8637fe49ee5d3436cfe204ca6cee6d889bc30423f0c8a570a2
- 05afafa79827aee66c0caf542a4b2da4266d29f51913c102b70759059c040ce1
- ed7d172ace81e7a6926f516c6c8e5e47c8c0f472dfd6147b6f649be098a1e062
- c176498c700120c99762d049e47467308e6d06d51d73db69c3f09156088b9673
- 1617641af757658d673d4111113bcb7f47604f4f00428f1d96c2f9ba5751c48b
- 5b98e6a1bb630a07e164f1db3c5d1dda1624a33304f255b9b4b2baf15597b963
SHA-1
- 29aaf7b71d705841887ed904f0ba2d2f85ad3a13
- 04e6175ecc59094e7b6e9c9c55a16160f9aa26a2
- a86dbffaa0ccb4cf46e0dc9fa17203e98940184b
- d0aab43af030845d6b0fab10827ca37b9822e4ce
- fe68226af9e43030ceda44f69bc5e3f38d52af9d
- ec68b1b17044231bb85aa7bffeda2386b4b814b4
- ff10b1f723376174fecbc4335898e693799acd1b
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.