TrojanSpy.Win32.REDLINESTEALER.M
Trojan:Win32/Azorult.EH!MTB (MICROSOFT)
Windows

Threat Type: Trojan Spy
Destructiveness: No
Encrypted: Yes
In the wild: Yes
OVERVIEW
Downloaded from the Internet, Dropped by other malware
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It connects to certain websites to send and receive information.
TECHNICAL DETAILS
289,267 bytes
EXE
No
06 Sep 2022
Connects to URLs/IPs, Steals information
Arrival Details
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Information Theft
This Trojan Spy gathers the following data:
- Gathers the following system information:
- IP Address
- Country
- ZIP Code
- User Name
- Product Name
- OS Architecture
- Screen Resolution
- System Language
- CPU Information
- GPU Information
- Serial Number of Physical Disk Drives
- List of Installed Browsers
- List of Installed Antivirus Software
- List of Running Processes
- List of Installed Programs
- Gathers information from:
- Browsers:
- Chromium Based Browsers
- Gecko Based Browsers
- FTP Clients:
- FileZilla
- Messaging Applications:
- Telegram
- VPN:
- ProtonVPN
- NordVPN
- OpenVPN
- Others:
- Discord
- Steam
- Browser Extensions:
- Autofill data
- Browser data (login information, cookies) relating to the following wallets:
- YoroiWallet
- Tronlink
- NiftyWallet
- Metamask
- MathWallet
- Coinbase
- BinanceChain
- BraveWallet
- GuardaWallet
- EqualWallet
- JaxxxLiberty
- BitAppWallet
- iWallet
- Wombat
- AtomicWallet
- MewCx
- GuildWallet
- SaturnWallet
- RoninWallet
- TerraStation
- HarmonyWallet
- Coin98Wallet
- TonCrystal
- KardiaChain
- Phantom
- Oxygen
- PaliWallet
- BoltX
- LiqualityWallet
- XdefiWallet
- NamiWallet
- MaiarDeFiWallet
- Authenticator
- TempleWallet
- Saved credit cards
- Login information
- Browser cookies
Other Details
This Trojan Spy connects to the following URL(s) to get the affected system's IP address:
- https://api.ip.sb/ip
It connects to the following website to send and receive information:
- {BLOCKED}.{BLOCKED}.{BLOCKED}.249:16640
It does the following:
- It terminates itself if the following modules are loaded in memory:
- mscorjit.dll
- clrjit.dll
- It terminates itself if the environment variable Cor_Enable_Profiling is 0x1.
- It can avoid certain countries and IP addresses depending on the configuration received.
SOLUTION
9.800
17.814.03
15 Sep 2022
17.815.00
16 Sep 2022
Step 1
Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.
Step 2
Scan your computer with your Trend Micro product to delete files detected as TrojanSpy.Win32.REDLINESTEALER.M. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.