Tracking Redline developer: Maxim Rudometov

Tracking Redline developer: Maxim Rudometov

Two days ago, The Department Of Justice announced an international disruption effort against the current version of RedLine Infostealer. It's #OSINT time!

Maxim Rudometov's relation graph created with Predicta Graph

In the redacted complaint, Maxim Rudometov is identified as one of the developers of RedLine. Using Predicta Graph and #OSINT techniques, I’ve retraced each step taken by the @FBI. For full details, check out the complete graph!


On March 4, 2020, a blogger named Foxovsky published a post on RedLine and its creators. In his post, he mentioned two usernames connected to the stealer: Dendimirror and Alinchok

Foxovsky's first blog post about the Dendimirror stealer dates back to 2018: https://web.archive.org/web/20180819120557/https://foxovsky.ru/all/analiz-raboty-stillera-ot-dendimirror-alinchok/.

He also leaked the decompiled source code of the stealer on github: https://github.com/mem3nt0/Dendimirror_Stealer

https://www.predictagraph.com/graph/snapshot/65e1a4f2-6a26-434f-b712-d68ad7122f6d
Maxim Rudometov's relation graph created with Predicta Graph

The Dendimirror alias is clearly tied to a stealer, making it worth investigating to identify who’s behind it. Searching this alias in data leaks led me to a Yandex email address: [email protected]

https://www.predictagraph.com/graph/snapshot/65e1a4f2-6a26-434f-b712-d68ad7122f6d
Maxim Rudometov's relation graph created with Predicta Graph

Using Predicta Search API, I found two linked accounts:

https://www.predictagraph.com/graph/snapshot/65e1a4f2-6a26-434f-b712-d68ad7122f6d
Maxim Rudometov's relation graph created with Predicta Graph

Searching the username GHackiHG in data leaks revealed:

https://www.predictagraph.com/graph/snapshot/65e1a4f2-6a26-434f-b712-d68ad7122f6d
Maxim Rudometov's relation graph created with Predicta Graph

Using the Predicta Search API, I found this account: https://ask.fm/navi_ghacking. This introduces a new username: navi_ghacking!

Searching for this username on VK revealed that Maxim used it to promote his developer services: https://vk.com/wall-98119902. It also gave us a VK profile: https://vk.com/navi_ghacking

https://vk.com/wall-98119902

Clicking on the deleted post led to another VK account with the ID id170399893. Using https://vk.watch, numerous snapshots of this VK profile are accessible for further investigation.

https://vk.watch/170399893/profile

We have photos of Maxim!

Using Search4Faces, I discovered an additional VK profile linked to Maxim https://vk.com/id377254012

https://vk.com/id377254012

Did you notice the bloodzz.fenix Skype account is both listed on Maxim's VK profile? He mentioned it too in posts on certain hacker forums

That concludes the OSINT phase of our investigation. We traced the Dendimirror alias back to Maxim, who is clearly connected to malicious activity and stealer development. However, the question remains: is he definitively the developer of RedLine, as Foxovsky claimed?

https://www.predictagraph.com/graph/snapshot/65e1a4f2-6a26-434f-b712-d68ad7122f6d
Maxim Rudometov's relation graph created with Predicta Graph

Being an @FBI agent made the difference, they accessed server logs from providers like Binance, GitHub, Apple, and Skype. By analyzing Maxim’s connection patterns, they confirmed his role in RedLine's development and operation.

That’s a wrap! For the complete breakdown, check out the full graph with all the details: https://www.predictagraph.com/graph/snapshot/65e1a4f2-6a26-434f-b712-d68ad7122f6d


PS1: The VK group we found previously has been created by Maxim. In the group info we can find:


PS2: On GitHub, in the repository named "LicenseManager" there's a file titled Wolk.exe. This file has been uploaded to VirusTotal, where it's shown to connect to the domain https://sofatel4.ru

https://www.virustotal.com/gui/file/59f2035d265e7153fce7af9c7f1056da5fc8a85a0e364a2d544066327e110520

In 2019, another file named myfile.exe, which also connects to the domain, was uploaded to VirusTotal

This analysis reveals two additional pieces of information: the IP address 93.189.41.63 and the domain https://gdlvw1.com

https://virustotal.com/gui/file/d1418f5465ed04ce88d5ba557cdc7da746b95b00441663bdeb0f2a10f1a90ea5/relations


Emanuele Picariello

Connecting with the world and building a secure future | Content Creator on YouTube

3 个月

Great methodology! ????

回复
Eyran M.

■ HUMINT ■ GEOINT ■ IMINT ■ OSINT ■ Geopolitics ■ 27K + Followers

4 个月

Great work Robert, thanks for sharing! Baptiste Robert

回复

Amazing article, Baptiste!

回复

要查看或添加评论,请登录

Baptiste Robert的更多文章

  • GEOINT TIME: NK #2

    GEOINT TIME: NK #2

    Yesterday, an Instagram account shared this video from North Korea with the caption: "Snowfall in democratic people's…

    1 条评论
  • GEOINT TIME: NK #1

    GEOINT TIME: NK #1

    5 days ago, an Instagram account shared a video from North Korea with the caption: "A brave tourist secretly captures…

    2 条评论
  • Tracking LockBit's Developer: Rostislav Panev

    Tracking LockBit's Developer: Rostislav Panev

    On Friday, December 20, 2024, the U.S.

    1 条评论
  • Tracking USDoD: The OSINT Breakdown

    Tracking USDoD: The OSINT Breakdown

    Today, the famous hacker known as USDoD was arrested by the Brazilian police. The FBI had a way to find his identity…

    2 条评论
  • Décryptage: Arrestation de Pavel Durov

    Décryptage: Arrestation de Pavel Durov

    1. Les faits Hier soir, le fondateur de l'application de messagerie Telegram, Pavel Durov, a été arrêté à l'aéroport du…

    11 条评论

社区洞察

其他会员也浏览了