Stealing with Script: The Redline Malware

Redline Malware
Redline Malware
Infection Chain
Redline Malware
The MSI installer contains 2 PE files and a purported text file.
Redline Malware
Cheat Lab Setup

C2 Communication and stealer activity

Redline Malware
Communication with C2 occurs over HTTP.
Redline Malware
IP is attributed to the Redline family, with many engines marking it as malicious.
Redline Malware
screenshot sent to the threat actors’ server

Bytecode File Analysis 

Redline Malware
The script file was not compiling and throwing some errors
Redline Malware
base64 strings decode to more encoded data and not to plain strings
Redline Malware
examples of defining API functions
Redline Malware
Indicators of Compromise