{"id":17994,"date":"2022-02-02T10:19:03","date_gmt":"2022-02-02T18:19:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11727\/"},"modified":"2022-02-02T10:19:03","modified_gmt":"2022-02-02T18:19:03","slug":"news-11727","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11727\/","title":{"rendered":"COVID Omicron Variant Lure Used to Distribute RedLine Stealer"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<h2><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs.html?utm_source=blog&amp;utm_medium=campaign&amp;utm_campaign=FortiGuardLabs\">FortiGuard Labs<\/a>\u00a0Threat Research Report<\/h2>\n<p><b>Affected Platforms:<\/b> Windows<br \/> <b>Impacted Users:<\/b> Windows users<br \/> <b>Impact: <\/b>Various data including confidential information on the compromised machine will be stolen<br \/> <b>Severity Level: <\/b>Medium<\/p>\n<p>Just like the previous year, 2021 ended with COVID and 2022 started with the same. The only difference is that the world is now dealing with the new Omicron variant rather than the Delta variant, which emerged in April 2021. While reportedly less lethal than its predecessor, the Omicron variant has a much higher transmission rate, and as a result, daily counts of new Omicron patients have become a global concern. This has renewed heightened concern about the pandemic, and as we have all sadly learned, threat actors don\u2019t shy away from using misery and fear to their advantage.<\/p>\n<p><a href=\"https:\/\/www.fortinet.com\/fortiguard\/threat-intelligence\/threat-research.html?utm_source=blog&amp;utm_campaign=threat-research\">FortiGuard Labs<\/a> recently came across a curiously named file, \u201cOmicron Stats.exe\u201d, which turned out to be a variant of Redline Stealer malware. This blog will look at the Redline Stealer malware, including what\u2019s new in this variant, its core functions, how it communicates with its C2 server, and how organizations can protect themselves. <\/p>\n<h3>RedLine Stealer<\/h3>\n<p>Before talking specifics on this new RedLine Stealer variant, let\u2019s review what we know about RedLine Stealer in general.<\/p>\n<p>The first reports of RedLine Stealer go back to at least March of 2020 and it quickly became one of the more popular infostealers sold in underground digital markets. The Information harvested by RedLine Stealer is sold on the <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/how-threat-researchers-leverage-darknet-to-stay-ahead-of-cyber-threats\">dark net marketplace<\/a> for as low as 10 US dollars per set of user credentials. The malware emerged just as the world began to deal with increased numbers of COVID patients and the growing fear and uncertainty that can cause people to lower their guard, which may have prompted its developers to use COVID as its lure.<\/p>\n<p>According to the CIA, open source intelligence, or OSINT, is intelligence \u201cdrawn from publicly available material,\u201d although it can include sources only available to specialists or subscribers. Based on the global OSINT information collected and analyzed by FortiGuard Labs, the current Redline Stealer includes the following functionalities. <\/p>\n<p>Normally, these are the victims whose systems have been infected with any of the above-mentioned stealers, due to which victim have unknowingly had their account passwords and full browser details recorded, and then sent to marketplace operators. Generally, in such cases, each user profile includes login credentials for accounts on online payment portals, e-banking services, file-sharing or social networking platforms. As such, it attempts to collect the following information from browsers installed on the compromised machine, including all Chromium-based browsers and all browsers based on Gecko (i.e. Mozilla):<\/p>\n<ol>\n<li>Stored system information:\n<ol>\n<li>Login and passwords<\/li>\n<li>Cookies<\/li>\n<li>Auto-Fill Forms<\/li>\n<li>Browser User Agent Details<\/li>\n<li>Credit Card information<\/li>\n<li>Browser history<\/li>\n<\/ol>\n<\/li>\n<li>Installed FTP clients<\/li>\n<li>Installed IM clients<\/li>\n<li>It also engages in highly configurable information collection based on file path and file extension, including searching in subfolders.<\/li>\n<li>It sets up a blacklist of countries where Redline Stealer will not function<\/li>\n<li>It also collects the following machine information\n<ol>\n<li>\u00a0IP<\/li>\n<li>Country<\/li>\n<li>City<\/li>\n<li>Current user name<\/li>\n<li>Hardware ID<\/li>\n<li>Keyboard layouts<\/li>\n<li>Screenshot<\/li>\n<li>Screen resolution<\/li>\n<li>Operating system<\/li>\n<li>UAC settings<\/li>\n<li>User-Agent<\/li>\n<li>Information about PC components such as video cards and processors<\/li>\n<li>Installed antivirus solution<\/li>\n<li>Data\/Files from common folders such as desktop\/downloads, etc.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<div>\u00a0<\/div>\n<div>The current variant continues to perform all these functions. However, this new version includes additional changes and improvements, which are detailed below: <\/div>\n<h3><b>Infection vector for the RedLine Stealer variant (Omicron Stats.exe)<\/b><\/h3>\n<p>While we have not been able to identify the infection vector for this particular variant, we believe that it is being distributed via email. Past RedLine Stealer variants are known to have been distributed in COVID-themed emails to lure victims. The file name of this current variant, \u201cOmicron Stats.exe,\u201d was used just as the Omicron variant was becoming a global concern, following the pattern of previous variants. And given that this malware is embedded in a document designed to be opened by a victim, we have concluded that email is the infection vector for this variant as well. <\/p>\n<h3><b>Victimology<\/b><\/h3>\n<p>Based on the information collected by FortiGuard Labs, potential victims of this RedLine Stealer variant are spread across 12 countries. This indicates that this is a broad-brush attack and that the threat actors did not target specific organizations or individuals.<\/p>\n<h3><b>Functionality<\/b><\/h3>\n<p>Once Omicron Stats.exe is executed, it unpacks resources encrypted with triple DES using ciphermode ECB and padding mode PKCS7. Unpacked resources are then injected into vbc.exe. It copies itself to\u00a0C:Users[Username]AppDataRoamingchromedrlvers.exe and creates the following scheduled task for persistence:<\/p>\n<p style=\"margin-left: 80.0px;\">schtasks \/create \/sc minute \/mo 1 \/tn &quot;Nania&quot; \/tr<br \/> &quot;&#8217;C:Users[Username]AppDataRoamingchromedrlvers.exe&#8217;&quot; \/f<\/p>\n<p>The malware then attempts to exfiltrate the following system information from Windows Management Instrumentation (WMI):<\/p>\n<ul>\n<li>Graphics card name<\/li>\n<li>BIOS manufacturer, identification code, serial number, release date and version<\/li>\n<li>Disk drive manufacturer, model, total heads and signature<\/li>\n<li>Processor (CPU) information like unique ID, processor ID, manufacturer, name, max clock speed and motherboard information<\/li>\n<\/ul>\n<div>\u00a0<\/div>\n<div>The malware also decrypts strings with base64 and xor key &quot;Margented.&quot; The decrypted strings are &quot;freelancer.com&quot; and 207[.]32.217.89. It then accesses a Command and Control (C2) server (207[.]32[.]217[.]89:14588). It uses a unique header ,&quot;Authorization: ns1=d8cc092a9e22f3fc55d63aad32150529&quot; to verify itself, and the decrypted ID \u201cfreelancer.com\u201d to prevent connections from other malware or researchers.<\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p class=\"cq-text-placeholder-ipe\" data-emptytext=\"Text\">\n<\/p><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--6 aem-GridColumn--offset--default--3\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/omicron-variant-lure-used-to-distribute-redline-stealer\/_jcr_content\/root\/responsivegrid\/image_1387156330.img.png\/1641584138758\/img1.png\" alt=\"Figure 1. Configuration file of the RedLine Stealer variant\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 1. Configuration file of the RedLine Stealer variant<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The malware searches for the following strings on the compromised machine to locate relevant folders for data exfiltration: <\/p>\n<ul>\n<li>wallet.dat (information related to cryptocurrency)<\/li>\n<li>wallet (information related to cryptocurrency)<\/li>\n<li>Login Data<\/li>\n<li>Web Data<\/li>\n<li>Cookies<\/li>\n<li>Opera GX Stable<\/li>\n<li>Opera GX<\/li>\n<\/ul><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn aem-GridColumn--default--8 aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/omicron-variant-lure-used-to-distribute-redline-stealer\/_jcr_content\/root\/responsivegrid\/image_1250895190.img.png\/1641588202421\/img2.png\" alt=\"Figure 2. Code to search cryptocurrency wallets on the compromised machine\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 2. Code to search cryptocurrency wallets on the compromised machine<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The malware also looks for the following files for data exfiltration:<\/p>\n<ul>\n<li>Telegram Desktoptdata folder, which Telegram stores images and conversations.<\/li>\n<li>%appdata%discordLocal Storageleveldb, which stores Discord channel and channel-specific information that a user has joined, for the following files:\n<ul>\n<li>.log and .db files<\/li>\n<li>Files that match the following regular expression: [A-Za-zd]{24}.[w-]{6}.[w-]{27}<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"margin-left: 160.0px;\">[A-Z] is a regular expression used to search for files with names using any upper case alphabet from A-Z<br \/> [a-z] is a regular expression used to search for files with names using any lower case alphabets from a-z<br \/> d is a regular expression used to search for any digits<br \/> {24} is a regular expression used to match the previous tokens exactly 24 times<br \/> . Is a regular expression used to find \u201c.\u201d ( is an escape)<br \/> w is a regular expression used to find any word characters that include underscor<span>e<\/span><\/p>\n<ul>\n<li>Tokens.txt (used for Discord access)<\/li>\n<\/ul><\/div>\n<div class=\"cmp cmp-image aem-GridColumn--default--none aem-GridColumn--default--9 aem-GridColumn aem-GridColumn--offset--default--2\">               <noscript data-cmp-image=\"{&#34;smartImages&#34;:[],&#34;smartSizes&#34;:[],&#34;lazyEnabled&#34;:true}\">             <img decoding=\"async\" src=\"\/blog\/threat-research\/omicron-variant-lure-used-to-distribute-redline-stealer\/_jcr_content\/root\/responsivegrid\/image_1274890509.img.png\/1641584575040\/img3.png\" alt=\"Figure 3. Code to search log files under %appdata%discordLocal Storageleveldb on the compromised machine\"\/>         <\/noscript>          <span class=\"cmp-image--title\">Figure 3. Code to search log files under %appdata%discordLocal Storageleveldb on the compromised machine<\/span>         <\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>The malware also looks for and attempts to steal the following stored browser data:<\/p>\n<ul>\n<li>Login Data<\/li>\n<li>Web Data<\/li>\n<li>Browser User Agent Details<\/li>\n<li>Cookies<\/li>\n<li>Extension Cookies<\/li>\n<li>Autofill<\/li>\n<li>Credit Card information <\/li>\n<\/ul>\n<p>The malware also attempts to collect the following system information: <\/p>\n<ul>\n<li>Processors<\/li>\n<li>Graphics cards<\/li>\n<li>Total of RAM<\/li>\n<li>Installed programs<\/li>\n<li>Running processes<\/li>\n<li>Installed languages<\/li>\n<li>Username<\/li>\n<li>Installed Windows version<\/li>\n<li>Serial number<\/li>\n<\/ul>\n<p>The RedLine Stealer variants steals stored credentials for the following VPN applications: <\/p>\n<ul>\n<li>NordVPN<\/li>\n<li>OpenVPN<\/li>\n<li>ProtonVPN<\/li>\n<\/ul>\n<h3>C2 Infrastructure<br \/> <\/h3>\n<p>This variant uses 207[.]32.217.89 as its C2 server through port 14588. This IP is owned by 1gservers. Over the course of the few weeks after this variant was released, we noticed one IP address in particular communicating with this C2 server. Some telemetry data is shown below.<\/p>\n<p style=\"text-align: left;\">This 149[.]154.167.91 IP address is located in Great Britain and is part of the Telegram Messenger Network. It seems that the C2 server may be controlled by the Redline operators through an abused Telegram messaging service. This conclusion is not a huge leap as the malware author(s) offer both dedicated purchasing and support lines through their respective Telegram groups.<\/p>\n<h3><b>Conclusion<\/b><\/h3>\n<p>RedLine Stealer takes advantage of the ongoing COVID crisis and is expected to continue that trend. While it is not designed to have a catastrophic effect on the compromised machine, the information that it steals can be used for malicious actions by the same cybercriminal or sold to another threat actor for future activities. Stay outside of the red zone by exercising basic security practices, detailed below:<\/p>\n<h3><b>Fortinet Protections<\/b><\/h3>\n<p>FortiGuard Labs provides the following AV coverage against the RedLine Stealer variant: <\/p>\n<p style=\"margin-left: 40.0px;\">PossibleThreat.PALLASNET.H <\/p>\n<p>FortiGuard Labs provides the IPS signature \u201cRedLine.Stealer.Botnet\u201d to detect RedLine Stealer\u2019s communication with Command and Control (C2) servers. Please note that the signature is set to \u201cpass\u201d by default and needs to be toggled to \u201cdrop\u201d to block communications with its C2.<\/p>\n<p>All network IOCs are blocked by the WebFiltering client.<\/p>\n<p>FortiEDR blocks all malicious files based on reputation and behavioral detection. <\/p>\n<h3><b>Indicators of Compromise (IOCs) for this variant:<\/b><\/h3>\n<p><b>SHA2<\/b><br \/> 15FE4385A2289AAF208F080ABB7277332EF8E71EDC68902709AB917945A36740<\/p>\n<p><b>Network<\/b><br \/> 207.32.217.89:14588 (C2)<\/p>\n<h3>Other RedLine Stealer variant IOCs:<\/h3>\n<p><b>SHA2<\/b><\/p>\n<p>891aba61b8fec4005f25d405ddfec4d445213c77fce1e967ba07f13bcbe0dad5<\/p>\n<p>216a733c391337fa303907a15fa55f01c9aeb128365fb6d6d245f7c7ec774100<\/p>\n<p>73942b1b5a8146090a40fe50a67c7c86c739329506db9ff5adc638ed7bb1654e<\/p>\n<p>2af009cdf12e1f84f161a2d4f2b4f97155eb6ec6230265604edbc8b21afb5f1a<\/p>\n<p>bf31d8b83e50a7af3e2dc746c74b85d64ce28d7c33b95c09cd46b9caa4d53cad<\/p>\n<p>b8ebdc5b1e33b9382433151f62464d3860cf8c8950d2f1a0278ef77679a04d3b<\/p>\n<p>8d7883edc608a3806bc4ca58637e0d06a83f784da4e1804e9c5f24676a532a7e<\/p>\n<p>1b4fcd8497e6003009010a19abaa8981366922be96e93a84e30ca2885476ccd7<\/p>\n<p>fdeadd54dd29fe51b251242795c83c4defcdade23fdb4b589c05939ae42d6900<\/p>\n<p>af4bf44056fc0b8c538e1e677ed1453d1dd884e78e1d66d1d2b83abb79ff1161<\/p>\n<p>\u00a0<\/p>\n<p><b>Network:<\/b><\/p>\n<p>hxxps:\/\/privatlab[.]com\/s\/s\/nRqOogoYkXT3anz2kbrO\/2f6ceecb-a469-40b5-94a2-2c9cc0bc8445-Ewdy5l6RAylbLsgDgrgjNjVbn<\/p>\n<p>hxxps:\/\/privatlab[.]com\/s\/s\/3Qa0YRMaVaij07Z8BqzZ\/7ca69d4c-c5bb-4ab3-b5a9-87c17b7167b5-86yYgEGqbQMnoszgm0OmgGb6g<\/p>\n<p>hxxp:\/\/data-host-coin-8[.]com\/files\/9476_1641477642_2883[.]exe<\/p>\n<p>hxxp:\/\/data-host-coin-8[.]com\/files\/541_1641407973_7515[.]exe<\/p>\n<p>hxxp:\/\/data-host-coin-8[.]com\/files\/7871_1641415744_5762[.]exe<\/p>\n<p>hxxps:\/\/transfer[.]sh\/get\/HafwDG\/rednovi[.]exe<\/p>\n<p>hxxp:\/\/91[.]219.63.60\/downloads\/slot8[.]exe<\/p>\n<p>91.243.32.13:1112 (C2)<\/p>\n<p>185.112.83.21:21142 (C2)<\/p>\n<p>23.88.11.67:54321 (C2)<\/p>\n<p>178.20.44.131:8842 (C2)<\/p>\n<p>91.243.32.94:63073 (C2)<\/p>\n<p>95.143.177.66:9006 (C2)<\/p>\n<p>45.147.230.234:1319 (C2)<\/p>\n<p>31.42.191.60:62868 (C2)<\/p>\n<p>135.181.177.210:16326 (C2)<\/p>\n<p>\u00a0<\/p>\n<p>FortiGuard Labs provide the following AV coverage against the RedLine Stealer variants listed above:<\/p>\n<p>W32\/Agent.A7D6!tr<\/p>\n<p>MSIL\/Agent.DFY!tr<\/p>\n<p>W32\/PossibleThreat<\/p>\n<p>PossibleThreat.PALLASNET.H<\/p>\n<p>W32\/GenKryptik.FNMI!tr<\/p>\n<p>W32\/AgentTesla.FDFF!tr<\/p>\n<p>\u00a0<\/p>\n<p>All network IOCs are blocked by the WebFiltering client.<\/p>\n<p><a href=\"https:\/\/www.fortinet.com\/products\/endpoint-security\/fortiedr.html?utm_source=blog&amp;utm_campaign=fortiedr\">FortiEDR<\/a> blocks all of the files based on reputation and as well behavioral detection.<\/p>\n<p>Additionally, FortiGuard Labs also provides the following AV coverage against RedLine Stealer malware in general:<\/p>\n<p>MSIL\/Redline.5418!tr<\/p>\n<p>W32\/Redline.HV!tr<\/p>\n<p>W32\/Redline.HU!tr<\/p>\n<p>W32\/Redline.HP!tr<\/p>\n<p>W32\/Redline.HL!tr<\/p>\n<p>W32\/Redline.HT!tr<\/p>\n<p>W32\/Redline.AOR!tr<\/p>\n<p>W32\/Redline.HQ!tr<\/p>\n<p>W32\/Redline.HS!tr<\/p>\n<p>W32\/Redline.HM!tr<\/p>\n<p>W32\/Redline.HX!tr<\/p>\n<p>W32\/Redline.HR!tr<\/p>\n<p><i>Learn more about Fortinet\u2019s\u00a0<\/i><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=blog&amp;utm_campaign=fortiguard-labs\"><i>FortiGuard Labs<\/i><\/a><i>\u00a0threat research and intelligence organization and the FortiGuard Security Subscriptions and Services\u00a0<\/i><a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?tab=security-bundles&amp;utm_source=blog&amp;utm_campaign=security-bundles\"><i>portfolio<\/i><\/a><i>.<\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-qbkzwxxbiv83f0ol5a2d-holder\"><\/div>\n<\/div><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/omicron-variant-lure-used-to-distribute-redline-stealer\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"\/blog\/threat-research\/omicron-variant-lure-used-to-distribute-redline-stealer\/_jcr_content\/root\/responsivegrid\/image_1387156330.img.png\/1641584138758\/img1.png\"\/><br \/>Threat actors continue to maximize pandemic related social engineering lures. Read about a COVID Omicron variant related lure FortiGuard Labs discovered used to distribute RedLine Stealer malware.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-17994","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17994"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17994\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}