

PoC Released: Windows Explorer Vulnerability Leaks NTLM Hashes
March 21, 2025
CVE-2024-50053 – Zoho ManageEngine ServiceDesk Plus Vulnerability
March 21, 2025
PoC Released: Windows Explorer Vulnerability Leaks NTLM Hashes
March 21, 2025
CVE-2024-50053 – Zoho ManageEngine ServiceDesk Plus Vulnerability
March 21, 2025Severity
High
Analysis Summary
Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered in 2018 and has been known to target a variety of industries, including finance, retail, healthcare, and technology. The malware is typically spread through phishing emails, fake software downloads, or other forms of social engineering. Once installed on a victim's computer, Redline Stealer can collect a wide range of information, including login credentials, credit card numbers, and other sensitive data.
This stealer is designed to be difficult to detect by traditional antivirus software, and it often uses advanced techniques to evade detection. It can also be used to launch further attacks, such as distributing additional malware or stealing further data.
The malware has been known to target a variety of applications and software, including web browsers, email clients, and messaging applications. It can also capture screenshots and record keystrokes to collect additional information. Redline Stealer has been used in several high-profile cyber attacks and is considered a significant threat to computer security. To protect against Redline Stealer and other types of malware, it is important to practice good cybersecurity hygiene, including regularly updating software and operating systems, using strong passwords, and being cautious when clicking on links or downloading files from unknown sources. It is also recommended to use reputable antivirus and anti-malware software to help detect and remove any infections.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
MD5
f73b3a18749f93464d20169a1a614476
9a97aafa56c5110f9a58cfb47d79d8d8
b8f1d13079c3ab093445a9a2b97b3c03
af3d016a7df04c2e7051fa687b9f38bc
SHA-256
60822618cc289328a7b644856942732283c710733eaad8f2896bdbf837e0b5b3
382fc4c16b61a91a06b3e930c18744b5d37e1c06e85b10055604f1c45ea1936c
1c3857b716fc65dbd1ffdc7e06b1d2b0420537ac4f113d7ece283b64fee8c976
b77d2ac80bfa9fc886478caa6650394e1aa9fbd87c5f228a88a7f179cfd1a8d3
SHA-1
d4a00a31194d3b5ec05b6e95f3f0d7e8ee80f94e
e4c02a1a024295e7c98fd9f27c02ba0c42d33d4f
df77af2e3d587d4dc67e8f990161062fe458763c
0fd241f53eadbde1a3c684b3e5e6343c5ee4308d
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.