NJRAT – Active IOCs
July 23, 2025Multiple Microsoft Windows Products Vulnerabilities
July 23, 2025NJRAT – Active IOCs
July 23, 2025Multiple Microsoft Windows Products Vulnerabilities
July 23, 2025Severity
High
Analysis Summary
Redline Stealer is a type of malware that is used to steal sensitive information from infected systems. The malware was first discovered in 2018 and has been known to target a variety of industries, including finance, retail, healthcare, and technology. The malware is typically spread through phishing emails, fake software downloads, or other forms of social engineering. Once installed on a victim's computer, Redline Stealer can collect a wide range of information, including login credentials, credit card numbers, and other sensitive data.
This stealer is designed to be difficult to detect by traditional antivirus software, and it often uses advanced techniques to evade detection. It can also be used to launch further attacks, such as distributing additional malware or stealing further data.
The malware has been known to target a variety of applications and software, including web browsers, email clients, and messaging applications. It can also capture screenshots and record keystrokes to collect additional information. Redline Stealer has been used in several high-profile cyber attacks and is considered a significant threat to computer security. To protect against Redline Stealer and other types of malware, it is important to practice good cybersecurity hygiene, including regularly updating software and operating systems, using strong passwords, and being cautious when clicking on links or downloading files from unknown sources. It is also recommended to use reputable antivirus and anti-malware software to help detect and remove any infections.
Impact
- Data Exfiltration
- Credential Theft
- Information Theft
- Financial Loss
Indicators of Compromise
IP
178.250.188.181
147.45.222.249
209.54.102.152
103.59.160.219
MD5
308e6daeabe60a18225112c8a15b8316
289d29a9fedf2868c4e3575e7c3a16d7
0c6f9ab8c9e7d343f0ccae86803279c0
daff672d6a7c4a1c713e195e9fc2be47
SHA-256
67559021bb3b13bef30226a052dd097156aa998543f4a3689649f4e00de86686
af429c283dcd245b61dd36bc463f32b80d12e88bcb2db1fa4ccf252756ee7287
34815fc9badaa5b7ef9b8394a1aa00bbf98917382f565e9b782293f0e623b5a3
e74447674de0d55b2b2cde2c6bde58806c411c3f0304d518630bf850145f2cef
SHA-1
93766d0e67da75e33b16f237d39d9f93320ee8e8
51f3172d48bfb5c21a25af036cdf9f8c5c1ab81e
fc2ca71cfcb1b5f514186c3a36700544026f597e
2c6f60b80bb80ad293ccfb0406515ec45bdd7ce3
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.