Post

Red Stealer — Threat Intelligence Walkthrough

Analyze a suspicious executable using VirusTotal and MalwareBazaar to extract IOCs, identify C2 infrastructure, MITRE ATT&CK techniques, and privilege escalation mechanisms.

Red Stealer — Threat Intelligence Walkthrough

Overview

  
PlatformCyberDefenders
CategoryThreat Intelligence
DifficultyEasy
FocusIOC Extraction · C2 Identification · MITRE ATT&CK Mapping · Malware Classification
Lab LinkRed Stealer

You are part of the Threat Intelligence team in the SOC. An executable file has been discovered on a colleague’s computer, suspected to be linked to a Command and Control (C2) server, indicating a potential malware infection.

Your task is to investigate this executable by analyzing its hash. The goal is to gather and analyze data beneficial to other SOC members, including the Incident Response team, to respond to this suspicious behavior efficiently.


Objective

The goal of this investigation is to:

  • Classify the malware and identify its family
  • Extract network-based IOCs (IPs, domains, ports)
  • Map behaviors to MITRE ATT&CK techniques
  • Identify detection signatures (YARA rules)
  • Understand privilege escalation mechanisms

By the end, we will provide actionable intelligence for:

  • Firewall block rules
  • EDR detection signatures
  • Threat hunting queries
  • Incident response procedures

Tools Used

Throughout this analysis, the following tools are used:

  • VirusTotal — Malware analysis and threat intelligence
  • MalwareBazaar — Malware sample database
  • ThreatFox — IOC database by abuse.ch
  • Whois — Domain registration lookup

Initial Analysis

Sample Hash (SHA256):

1
248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b

We begin our investigation by searching this hash on VirusTotal.


Q1 — Malware Category

Question

Categorizing malware enables a quicker and clearer understanding of its unique behaviors and attack vectors. What category has Microsoft identified for that malware in VirusTotal?


Analysis

Navigate to VirusTotal and search for the sample hash. Go to the Detection tab and review the security vendors’ analysis.

VirusTotal Detection Microsoft identifies this malware as Trojan:Win32/Redline!rfn

Looking through the security vendors’ detections, Microsoft identifies this malware as:

1
Trojan:Win32/Redline!rfn

The malware category is:

1
Trojan

This classification aligns with RedLine Stealer’s behavior — it disguises itself as legitimate software while stealing sensitive information from infected systems.


Q2 — Malware File Name

Question

Clearly identifying the name of the malware file improves communication among the SOC team. What is the file name associated with this malware?

Note: Don’t include the file extension in the name.


Analysis

On the VirusTotal main page for the sample, we can see the basic file information.

VirusTotal Filename File details showing 62/72 detection rate and filename

File Details:

PropertyValue
Detection62/72 vendors flagged
Size1.83 MB (1,917,440 bytes)
File TypeWin32 EXE

The file name is:

1
Wextract

Q3 — First Submission Timestamp

Question

Knowing the exact timestamp of when the malware was first observed can help prioritize response actions. Newly detected malware may require urgent containment and eradication compared to older, well-documented threats. What is the UTC timestamp of the malware’s first submission to VirusTotal?

Format: YYYY-MM-DD HH:MM


Analysis

Navigate to the Details tab in VirusTotal and scroll to the History section.

VirusTotal History History section showing submission timeline

Timeline:

EventTimestamp (UTC)
Creation Time2022-05-24 22:49:06
First Submission2023-10-06 04:41:50
First Seen In Wild2023-10-07 07:20:23
Last Submission2025-11-07 12:05:39

The first submission timestamp is:

1
2023-10-06 04:41

The malware was created in May 2022 but wasn’t submitted to VirusTotal until October 2023, suggesting it may have been used in targeted attacks before being discovered publicly.


Q4 — MITRE ATT&CK Collection Technique

Question

Understanding the techniques used by malware helps in strategic security planning. What is the MITRE ATT&CK technique ID for the malware’s data collection from the system before exfiltration?


Analysis

Navigate to the Behavior tab in VirusTotal and scroll to the MITRE ATT&CK Tactics and Techniques section. Look for techniques under the Collection tactic.

MITRE ATT&CK Collection MITRE ATT&CK techniques showing Collection tactics

Collection Techniques Identified:

Technique IDNameDescription
T1005Data from Local SystemCollects data stored on local system
T1056Input CaptureCaptures user input (keylogging)
T1119Automated CollectionAutomatically gathers data

The MITRE ATT&CK technique for data collection is:

1
T1005

Why T1005?

T1005 (Data from Local System) is the primary collection method because RedLine Stealer’s core functionality targets stored data:

  • Browser credentials and cookies
  • Cryptocurrency wallets
  • Saved passwords
  • FTP/VPN credentials
  • Email client data

The question asks specifically for data collection before exfiltration, and T1005 represents exactly this — gathering sensitive information from the compromised system.


Q5 — Social Media Domain Resolution

Question

Following execution, which social media-related domain names did the malware resolve via DNS queries?


Analysis

In the Behavior tab, scroll to the DNS Resolutions section to see which domains the malware contacted.

DNS Resolutions DNS Resolutions showing facebook.com among resolved domains

Domains Resolved:

  • business.bing.com
  • connect.facebook.net (Facebook CDN)
  • facebook.com ← Social media domain
  • fbcdn.net (Facebook CDN)
  • fbsbx.com (Facebook infrastructure)
  • static.xx.fbcdn.net (Facebook CDN)
  • www.facebook.com

The social media domain is:

1
facebook.com

While multiple Facebook-related domains appear (CDNs, static content servers), facebook.com is the primary social media platform domain. The malware likely resolves this to check internet connectivity or to blend in with normal user traffic.


Q6 — C2 Communication Details

Question

Once the malicious IP addresses are identified, network security devices such as firewalls can be configured to block traffic to and from these addresses. Can you provide the IP address and destination port the malware communicates with?


Analysis

In the Behavior tab, scroll to the IP Traffic section to see network connections made by the malware.

IP Traffic C2 IP Traffic showing C2 server at 77.91.124.55:19071

IP Traffic Analysis:

ProtocolDestinationPurpose
TCP77.91.124.55:19071Command & Control
TCP31.13.67.35:443www.facebook.com
TCP13.107.6.158:443business.bing.com
TCP31.13.88.13:443static.xx.fbcdn.net

The C2 IP address and port is:

1
77.91.124.55:19071

Why is this the C2 server?

  1. Non-standard port 19071 — Legitimate services use standard ports (443, 80)
  2. Does not resolve to any legitimate domain
  3. First connection in the IP traffic list
  4. This is the attacker-controlled infrastructure receiving stolen data

IOC for Blocking:

  • IP: 77.91.124.55
  • Port: 19071
  • Protocol: TCP

Q7 — YARA Rule Identification

Question

YARA rules are designed to identify specific malware patterns and behaviors. Using MalwareBazaar, what’s the name of the YARA rule created by “Varp0s” that detects the identified malware?


Analysis

Navigate to MalwareBazaar and search for the sample hash:

1
sha256:248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b/

Scroll down to the YARA Signatures section.

MalwareBazaar YARA YARA Signatures section showing detect_Redline_Stealer by Varp0s

YARA Rule Details:

PropertyValue
Rule Namedetect_Redline_Stealer
AuthorVarp0s
TLPCLEAR (publicly shareable)

The YARA rule name is:

1
detect_Redline_Stealer

What are YARA Rules?

YARA (Yet Another Recursive Acronym) is a pattern-matching tool used to identify and classify malware based on textual or binary patterns. The detect_Redline_Stealer rule contains signatures that uniquely identify this malware family, allowing automated detection.


Q8 — Malware Alias from ThreatFox

Question

Understanding which malware families are targeting the organization helps in strategic security planning for the future and prioritizing resources based on the threat. Can you provide the different malware alias associated with the malicious IP address according to ThreatFox?


Analysis

Navigate to ThreatFox and search for the C2 IP address:

1
2
https://threatfox.abuse.ch/
Search: ioc:77.91.124.55

ThreatFox Results ThreatFox showing IOC with RECORDSTEALER alias

IOC Information:

PropertyValue
IOC77.91.124.55:19071
IOC Typeip:port
Threat Typebotnet_cc (C2)
MalwareRedLine Stealer
Malware AliasRECORDSTEALER
Confidence100%

The malware alias is:

1
RECORDSTEALER

Why Multiple Names?

Malware families often have aliases assigned by different vendors:

  • RedLine Stealer — Common industry name
  • RECORDSTEALER — Alias in threat intelligence databases

This helps correlate threats across different security platforms and vendor reports.


Q9 — Privilege Escalation DLL

Question

By identifying the malware’s imported DLLs, we can configure security tools to monitor for the loading or unusual usage of these specific DLLs. Can you provide the DLL utilized by the malware for privilege escalation?


Analysis

In the Behavior tab on VirusTotal, scroll to the Modules loaded section.

Modules Loaded Runtime Modules showing advapi32.dll for privilege escalation

Runtime Modules Loaded:

  • APPHELP.DLL
  • advapi32.dll ← Privilege escalation DLL
  • advpack.dll
  • Various dropped executables in %TEMP%\IXP00X.TMP\

The privilege escalation DLL is:

1
advapi32.dll

What is advapi32.dll?

advapi32.dll (Advanced Windows 32 Base API) is a Windows system library providing access to:

  • Security and privilege management
  • Registry manipulation
  • Service management
  • User account control
  • Token manipulation

Why is this used for privilege escalation?

This DLL contains critical Windows API functions commonly abused by malware:

FunctionPurpose
AdjustTokenPrivileges()Modify security tokens
OpenProcessToken()Access process security tokens
LookupPrivilegeValue()Query privilege information
ImpersonateLoggedOnUser()Impersonate user accounts

By monitoring unusual loading or API calls to advapi32.dll, security tools can detect privilege escalation attempts.


Conclusion

This investigation successfully identified a RedLine Stealer sample (alias: RECORDSTEALER) communicating with a C2 server at 77.91.124.55:19071.

Summary of Findings

QuestionFinding
Q1Microsoft category: Trojan
Q2File name: Wextract
Q3First submission: 2023-10-06 04:41
Q4MITRE ATT&CK Collection: T1005
Q5Social media domain: facebook.com
Q6C2 IP:Port: 77.91.124.55:19071
Q7YARA rule: detect_Redline_Stealer
Q8Malware alias: RECORDSTEALER
Q9Privilege escalation DLL: advapi32.dll

Indicators of Compromise (IOCs)

File Indicators:

TypeValue
SHA256248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b
MD518cbe55c3b28754916f1cbf4dfc95cf9
SHA-17ccfb7678c34d6a2bedc040da04e2b5201be453b

Network Indicators:

TypeValue
C2 IP77.91.124.55
C2 Port19071
ProtocolTCP

Through open-source threat intelligence platforms (VirusTotal, MalwareBazaar, ThreatFox), we gathered comprehensive IOCs for the SOC and Incident Response teams to detect, block, and hunt for this threat across the organization.

This post is licensed under CC BY 4.0 by the author.