

Gafgyt aka Bashlite Malware – Active IOCs
March 13, 2025
ICS: Multiple Schneider Electric Products Vulnerabilities
March 13, 2025
Gafgyt aka Bashlite Malware – Active IOCs
March 13, 2025
ICS: Multiple Schneider Electric Products Vulnerabilities
March 13, 2025Severity
High
Analysis Summary
Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered in 2018 and has been known to target a variety of industries, including finance, retail, healthcare, and technology. The malware is typically spread through phishing emails, fake software downloads, or other forms of social engineering. Once installed on a victim's computer, Redline Stealer can collect a wide range of information, including login credentials, credit card numbers, and other sensitive data.
This stealer is designed to be difficult to detect by traditional antivirus software, and it often uses advanced techniques to evade detection. It can also be used to launch further attacks, such as distributing additional malware or stealing further data.
The malware has been known to target a variety of applications and software, including web browsers, email clients, and messaging applications. It can also capture screenshots and record keystrokes to collect additional information. Redline Stealer has been used in several high-profile cyber attacks and is considered a significant threat to computer security. To protect against Redline Stealer and other types of malware, it is important to practice good cybersecurity hygiene, including regularly updating software and operating systems, using strong passwords, and being cautious when clicking on links or downloading files from unknown sources. It is also recommended to use reputable antivirus and anti-malware software to help detect and remove any infections.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
d89407ff1c7e68212ea29e5d7da5fba9
22c00ccdbab18812616ca11596d01bad
bd0fdaabed40d16fffeac608d7a68822
a0c0ee4d7de0c9cac81661a23530bafb
ea4ac79e673549898d54762f2ebb2302
SHA-256
af621a0196ca315b44e889e295e0b227a1ed3afc3e2f1b266875436874138fa3
66b2852e9c3b6f98df012b7812ad72e13f234a54b4c1ad7c42258b6e62b632bd
b3f87af043d22e844171b6bf66e4a6d966d880c0dd8e8aa61f25ac382546b3af
077364482914188a642ea8de919005104d1609840ac543f6479bf63fc3c54d67
b4ae32a0dfe1d99f5a3afed227708f46d176809e448908c892514dee402674db
SHA-1
8def9ed32436c34b27fcee48b9b10e4f4b519f74
1bb64a238aadeab6dd86231121b60d3d4ee086d5
f2a5d6a2be78424dc598ebb636401add7f2feef9
b2027c880471cfc27de4465c0f008b8cb6038a84
ecff793cd3647c6f5368033ada6a65229b9fe4b4
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.