Redline Botnet is the best botnet and has awesome features with stealers.
Redline has many features, and this botnet is very popular, and many hackers were using it to steal accounts, cookies, credit cards, crypto wallets (core software), and much more. This one can also be used by hackers using redline, and some tools called cookies checker combine them very well!
RedLine Data Stealing
The first and foremost capability of the RedLine Stealer is reconnaissance of the environment it is running in. It is not about anti-detection and anti-analysis tricks, but about having a full footprint of a system. Malware is capable of this action even when it receives a blank configuration from the C2, i.e., it is its basic functionality.
Time Zone
Languages
Hardware information
Username
Windows version and build
Screenshot
Installed browsers
Installed antivirus software
Currently running processes
Using configurations, however, RedLine Stealer can grab a much wider range of data, including passwords of different categories, bank card numbers, and cryptocurrency wallets, as well as data from web browsers and several specific desktop applications. Letās take a look at each data source.
Web browsers
RedLine can break into numerous web browsers, from the ever-loved ones, like Chrome, Opera, and Firefox, to alternatives based on Chromium and Quantum. Key points of interest there are divided into in-browser data and data from add-ons related to cryptocurrency wallets. The stealer can steal saved passwords and credit card data from AutoFill forms. Actually, it can grab whatever it finds in auto-fill, since this is its main way of stealing data from browsers. Another thing RedLine Stealer seeks in web browsers is cookies. Depending on the way the browser stores cookies (i.e., as an encrypted file or within an SQL database), malware can extract them as well.
Browser extensions are a bit of a different story. Malware brings a hefty list of extensions that are used to manage hot cryptocurrency wallets. Malware scans web browser files in order to locate some of them. Then it dumps data related to all the matches (or skips if none are found). It specifically aims at passwords and cookies related to these extensions, copying whatever it locates to its folder with files. The list of wallets it targets is as follows:
Desktop applications
There are three desktop programs that RedLine Stealer pays specific attention to. Those are Discord, Steam, and Telegram Messenger. The primary target is session hijacking and stealing files related to sessions (in Telegram). The first and second ones have similar session management methods based on tokens. When attacking them, malware goes to their directories in AppData. Roaming and rummaging through their files, searching for session tokens. Malware knows the naming pattern used by both Steam and Discord, and it searches specifically for files that fit this naming convention.
Telegram tiene un mecanismo diferente para el manejo de sesiones que no permite el mismo truco. Por ese motivo, RedLine Stealer solo obtiene todos los archivos posibles relacionados con la sesión del usuario almacenados en la carpeta AppDataTelegram Desktoptdata.
Aplicaciones VPN y FTP
RedLine es capaz de robar credenciales de inicio de sesión para varios servicios VPN y aplicaciones FTP, como OpenVPN, NordVPN, ProtonVPN y FileZilla. En el caso de las VPN, simplemente busca archivos de configuración en sus directorios de usuario. Por ejemplo, para obtener los datos de los usuarios en NordVPN, busca en su directorio, AppDataLocalNordVPN, y busca archivos .config. En estos archivos, busca los nodos "//setting/vvalue".
View attachment 166356
View attachment 166357
View attachment 166358
View attachment 166359
VIDEO TUTORIAL
[SPOILERS]
VIDEO
[/SPOILERS]
Enlace:
***Texto oculto: no se puede citar.***
***Texto oculto: no se puede citar.***