Credential Stealer RedLine Reemerges
We at K7 Lab s noticed that there were several RedLine Stealers resurfacing. Hence, we decided to analyze one such sample from our incident queue . The sample we studied for the sake of this blog was an NSIS compiled binary with the NSIS script and the malicious binary in its overlay. Upon execution it drops 2 executables in the ‘AppData\Roaming’ folder. @deadma3ay_crypted.exe 1079929187.exe It then runs “@deadma3ay_crypted.exe” in background and injects the malicious code into a suspended instance of the ClickOnce .Net utility named AppLaunch.exe and then proceeds to connect with the C2 server. The process tree showing AppLaunch.exe was started in suspended state as shown below. Figure 1: Process tree Figure 2: @deadma3ay_crypted.exe creates a process which is in suspended state Figure 3 :AppLaunch,exe created and is in suspended state Highlighted above is the call to the API CreateProcessW with the “ dwCreationFlags ” set to 0x00000004 meaning it would start the pro...