• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Redline Stealer HTTP Activity

Risk Factors

Redline Stealer is a well-supported malware-as-a-service product that attackers can license and deploy with minimal expertise. Through a persistent C&C channel, an attacker can scan and exfiltrate credentials that can be leveraged to launch additional attacks on the network.

Kill Chain

Command-and-Control

Risk Score

83

Detection diagram
Next in Command-and-Control: Redline Stealer TCP Activity

Attack Background

In Redline Stealer attacks, an attacker tricks the victim into downloading the Redline malware, typically through phishing or social engineering. Once deployed, Redline Stealer scans for credentials throughout the network including web browsers and browser caches, VPNs, cryptocurrency wallets, and other applications. Additionally, Redline collects information related to operating systems, hardware, IP addresses, and other system characteristics. Redline collects credentials and sends logs to the C&C server in SOAP messages. The server then generates an XML file known as a Stealer log. The Stealer log can be sold on darknet marketplaces, or the attacker can exploit the log for future attacks on the network.

Mitigation Options

Enforce multi-factor authentication for all users

Quarantine the device while checking for the presence of malware

Monitor and investigate unusual network activity for lateral movement or data exfiltration

MITRE ATT&CK ID

What else can RevealX do for you?