Rewterz
Rewterz Threat Advisory – CVE-2021-41079 – Apache Tomcat Vulnerability
September 16, 2021
Rewterz
Rewterz Threat Alert – SNAKE Ransomware – Active IOCs
September 17, 2021

Rewterz Threat Alert – RedLine Malware – Active IOCs

Severity

High

Analysis Summary

Redline the data burglar of users’ confidential information from web browsers and by installing malicious software this redline stealer can harm the operating systems. The malware appeared in March 2020 according to the Proofpoint investigation. During the COVID-19 pandemic, redline spread across many countries and it is still active to achieve its purpose by stealing passwords, credit card information, username, location, autofill data, cookies, software set, and even hardware configuration like keyboard layout, UAC settings, etc.

Impact

  • Credential Theft
  • Unauthorized Access

Indicators of Compromise

MD5

  • c30c8d82b37794b228ae5659f92af417
  • 3363f7cdf387c46a8acc21f6f106f7fb
  • a48a650456edc94b9cc8e5dfaeb3c669
  • 1e1fe2660355a893ed58a03381f479d0
  • 693b398f13f1ffd324805ed4e1e66607
  • 65b21b608ce0bcde1da32e3036e35b10
  • 49689d499e14d32cc93499203882ff61
  • c740605dbdb73f5b940ff5efa79ae2e3
  • 8ef368005c958aa0702c42d1138172e3
  • 9313fa63db26acca36a64459cec2f5f9
  • 93cd7989417554091af6828ecfa6fda5

SHA-256

  • 857c5e7d6a33d89af8d24b218512661bcaac1f66929a242b2de0d6860cb1d07b
  • 2facc80b9d0a9c396faf53d48e5a0793b2aa5697fba31e1a4148996e6b49343f
  • 169ff3a1a1a5c55617ad540e3baac3589d607c65e6e8f6ece2b388f728022120
  • 9917794c524b57593f2bcd0b8fca162d2b1a63f7ce4e0997c9540428fb4a34f2
  • d1e7208de1d5f7f248c9bde9971f17f3e221acdb430a4aaf9e65904eaa70227a
  • 89801429572aec994155dc76b8ffad60b8500a60f35602a1ab39e461753171de
  • 946bf7b20b10f5841a2b98aca1d12b4214b7b1961863a6dc4078740e236715c0
  • 329f593e40eaecedb0e932644d7ae1151bd7a1f892bbf9a94c8f5e49b4d9fa12
  • 103593087542fd054a226b5f16ed28ea1419f68fc9d0bbd4f74e9aed6315eb6d
  • bd171795235f341692e083fef4a9747330eddfa2ca130a59f0848db8a27e71ac
  • ef9a8998c8171a26ac269ab92c51b970bf10969417c2a7c67cdd8fbe66ada98e

SHA-1

  • 698ab2e1c04aaaa6d154fdc69981e875fadcd287
  • e12e4b7a8d0d15e92af0d8799420708339eb76d0
  • edcbf2071adf130c0063df7614bd47df2bd43f34
  • b3fe08ecba769f47d1349c77105ef64e6e45428d
  • 37e46579221376072910a010d1bae2718635f318
  • 5cc380ba30ae62db6d0af43743a3273626e9ff74
  • 8e31925367bb40083193242d64349fc1566a8042
  • 647abb0ee6228aadc047614fc15e8602e354f17f
  • 45706604bed21390387cf97ba362179b4c3fc24f

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.