Cybersecurity

HUMAN Satori Threat Intelligence Alert: Account Takeover Attacks Use ScrubCrypt to Deploy RedLine Stealer Malware

Researchers: Gabi Cirlig, Adam Sell, Arik Atar

ScrubCrypt is an obfuscation tool threat actors use to help slip malware past antivirus software, allowing them to launch attacks that might otherwise be stopped. HUMAN’s Satori Threat Intelligence Team recently uncovered a new build of ScrubCrypt available for sale in underground communities and used in attacks on HUMAN customers. Satori researchers reverse engineered the attack to reveal the new ScrubCrypt build’s workings.

In an attack on a HUMAN customer, ScrubCrypt was used to deliver RedLine Stealer—a known cybersecurity attack capable of credential and cryptocurrency wallet exfiltration—with the intention of carrying out account takeover and account fraud attacks on the customer’s users.

HUMAN customers are protected from account takeover and account fraud attacks centered on stealer malware, including those using this iteration of ScrubCrypt.

RedLine Stealer is a piece of malware that targets end users with the goal of compromising accounts through stealing cookies, browser login data, and locally-stored login information. The malware receives commands from a C2 server to search for various items and patterns (username/password, cryptocurrency wallet formation, certain phrases in text files, etc.) and upload any matched data from the infected device to the attacker’s infrastructure. 

This allows threat actors to conduct account takeover and account fraud attacks by logging in with the stolen credentials or reusing the cookies stolen from the browser. RedLine Stealer is, essentially, an all-in-one solution for cookie and login stealing. RedLine Stealer has been extensively described by the cybersecurity community, but remains a threat nonetheless, particularly when paired with obfuscation tools like ScrubCrypt that help sneak RedLine Stealer past the AV software intended to detect it.

For a detailed analysis of RedLine Stealer, please visit any of the resources linked in the Acknowledgements section of this report.

This report will explore the attack surfaced by HUMAN from two perspectives: how the new build of ScrubCrypt works and how HUMAN found it. The former will share the results of the Satori team’s reverse engineering and threat intelligence of the sample, while the latter will examine the marketplaces on which it’s sold and how threat actors disseminate it to begin ATO or account fraud attacks.

Buying ScrubCrypt

ScrubCrypt’s “marketing” promotes the add-on to threat actors as an easy way to obfuscate executable files by converting them into batch files.


Banner ad promoting ScrubCrypt
Source: Satori Threat Intelligence and Research Team

This conversion—from executable file into batch file—enables threat actors to slip attacks past many preventative measures that might otherwise identify them. Many email providers and messaging platforms have safeguards that prevent executable files from showing up as attachments in a primary (non-spam) inbox. And .bat files don’t trigger antivirus software’s detection in the same way executable files might.

The new ScrubCrypt build was sold to threat actors on a small handful of dark web marketplaces, including Nulled Forum, Cracked Forum, and Hack Forums


ScrubCrypt sold on a dark web marketplace
Source: Satori Threat Intelligence and Research Team

In an effort to evade law enforcement, the website selling and hosting this new ScrubCrypt build is registered and hosted in Russia, outside the reach of US and EU agencies.


Details of one registrar for the new ScrubCrypt build
Source: Satori Threat Intelligence and Research Team

The C2 server sending instructions and receiving the stolen credentials from the associated RedLine Stealer sample, however, is hosted by an American provider of data center proxies and virtual servers. Satori researchers believe this is in an effort by the threat actors to avoid certain firewall protections by having the malware phone home to a server located within the country of the target.

.bat file

The first stage of the infection is a .bat file downloaded to a victim’s device, often as the result of social engineering. (For example, a link shared from a compromised account to another account via a direct-messaging system, or spread through an email from the mail provider on a compromised device.)

This .bat file carries a base64-encoded payload and is peppered throughout with nonsensical repeating strings:


Obfuscated .bat file
Source: Satori Threat Intelligence and Research Team

These strings are intended to help obfuscate the payload, but after removing them and decrypting the AES-encrypted file, the payload is revealed to be compressed gzip data.


Obfuscated .bat file with gibberish highlighted
Source: Satori Threat Intelligence and Research Team


Deobfuscated .bat file
Source: Satori Threat Intelligence and Research Team

gzip files, like the extension suggests, are unzippable, compressed files. Extracting the data stream reveals an obfuscated .NET executable file, the next stage of the infection.

.NET executable

The code of the .NET executable file is heavily obfuscated, as seen in the image below.


Obfuscated .NET intermediary layer
Source: Satori Threat Intelligence and Research Team

Satori researchers used certain functions from the obfuscated code and an open-source deobfuscation tool called d4dot to get a clearer look at the .NET payload.


Deobfuscated .NET intermediary layer
Source: Satori Threat Intelligence and Research Team

In the deobfuscated payload, Satori researchers observed that the file loads an embedded resource called P. The sample then deobfuscates P using an XOR cipher with a key embedded in the .NET executable to get the final Windows executable payload. In this research, the final payload was RedLine Stealer, though other payloads can be encrypted and slipped past antivirus protections with ScrubCrypt: 


Embedded payload within intermediary layer
Source: Satori Threat Intelligence and Research Team


Decryption key for final payload
Source: Satori Threat Intelligence and Research Team

The attack targeted one HUMAN customer through its direct messaging platform. This platform has been targeted by threat actors using RedLine Stealer before, but this was the first instance incorporating this build of ScrubCrypt.

This customer’s users were protected from the impacts of the RedLine Stealer payload by HUMAN’s Account Takeover Defense and Account Fraud Defense solutions. Account Takeover Defense identified automated and suspicious credential stuffing and brute force attempts, blocking the threat actors attempting these attacks from gaining access to user accounts. Account Fraud Defense identified compromised accounts and neutralized them, alerting the targeted platform and victimized users of the breach.

Both solutions can force compromised users to change their user credentials, confirm identity through 2FA, or other customizable results.

This story is an example of the importance of staying ahead of adversaries: as each new build of malware like RedLine Stealer or obfuscation tools like ScrubCrypt are unearthed and built into antivirus protections, threat actors go back to the drawing board to start designing the next build.

This attack is emblematic of an alternative means of compromising accounts. Rather than relying on leaked/stolen credentials followed by a brute-force attack, some threat actors prefer a malware-based approach to account fraud using stealers like the RedLine Stealer payload in this attack.

HUMAN recommends organizations (particularly those with direct/private messaging capabilities native to their user platforms) deploy protections that detect and mitigate cookie-stealing attacks and that flag users with credentials leaked or stolen in other threats.

The Satori Threat Intelligence Team would like to acknowledge the work of the following cybersecurity organizations, each of which has published information about RedLine Stealer:

(in no particular order)

Malpedia also has a lengthy list of analyses of RedLine Stealer. The Satori team recommends reviewing these resources for greater understanding of RedLine Stealer.

Additionally, the Satori team would like to acknowledge the work of cybersecurity organizations and researchers toward earlier versions of ScrubCrypt:

Malpedia also has a list of analyses of earlier iterations of ScrubCrypt.

SHA 256 hashes of RedLine Stealer payload with ScrubCrypt obfuscation:

SHA256Type
17fbe04f41d80d15ac5418cbe580e516a157aa0ce02495660feb653f658b43b8encryption software
fc286589f4422acb28fea5191fb05e9c9b177d4fd5b3795f0acfdee4ccafffacevasion layer
e2cc0ab598ae05e5665ebf621673fb8fbbd6a7d5bbd5cc4b43bda52bc77e8379final payload

IP address of C2 server: 23.230.159[.]97:38633

List of what RedLine Stealer can exfiltrate:

Login dataCrypto wallet dataVPN login data
Chrome saved passwordsYoroiWalletNordVPN
Firefox saved passwordsTronlinkOpenVPN
Opera saved passwordsNiftyWalletProtonVPN
Auto-fill contentMetamaskFileZilla
Browser cookiesMathWallet 
Discord login dataCoinbase 
Telegram login dataBinanceChain 
Discord chat logsBraveWallet 
Telegram chat logsGuardaWallet 
Steam account (SSFN)EqualWallet 
 JaxxxLiberty 
 BitAppWallet 
 iWallet 
 Wombat 
 AtomicWallet 
 MewCx 
 GuildWallet 
 SaturnWallet 
 RoninWallet 
 TerraStation 
 HarmonyWallet 
 Coin98 Wallet 
 TonCrystal 
 KardiaChain 
 Phantom 
 Oxygen 
 PaliWallet 
 BoltX 
 LiqualityWallet 
 XdefiWallet 
 NamiWallet 
 Maiar DeFi Wallet 
 Authenticator