BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
3
Global rank
9 infographic chevron month
Month rank
8
Week rank
3285
IOCs

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Stealer
Type
ex-USSR
Origin
1 March, 2020
First seen
6 May, 2024
Last seen
Also known as
RedLine

How to analyze RedLine Stealer with ANY.RUN

Type
ex-USSR
Origin
1 March, 2020
First seen
6 May, 2024
Last seen

IOCs

IP addresses
91.92.241.115
5.42.65.101
178.159.39.40
45.89.53.206
5.42.65.96
185.215.113.67
65.108.19.51
45.15.156.167
54.39.249.56
185.215.113.117
193.233.132.51
147.45.47.36
185.172.128.33
193.161.193.99
163.5.160.27
185.215.113.52
45.72.96.146
89.23.100.222
162.218.115.202
45.15.156.142
Hashes
c9e380d5c89547e1368f3c5d81df21906adeeea64b6b02388ff83f633b397110
e3c2865cc1a542d696c880d2c26a68a4e5c14ee4de216d57eb4aa312f5425978
45b6def20feedd1394fbf0c6c8884932836b315bd8acf4c03808f293628a1ca0
c95c0658ba155437043f658e02d9df92b8fff98e4ace3e01e1826ea5cb4501f6
8d6da5e1ec7b25e161f2c01983ebbfd64de706df2313cfb275952fe8cbaea051
3149863855e7996faceab6f072aa7f568859fdc81e1ce2838ad465d858eef6ee
bd40ae0f9a2ee01b7156fb13219c0163738c64084eb5eba7ad69346918876c48
1977e417e574af8be6c72e29b397434751b787b7d5c1b3d90d3b73459587d7e0
35d5a9f5cc15f80c1f63812a92c09d91e423040a7b1f17ce91199be5a0102218
76b784e87b42be83b3696080a54d8dce35a1eece9ad82679276ea902b9e2ecac
906f05d393fb44d249717c7cae76b8df9c9618c14a5a5987617901d688d17f74
5066186c53f71a9bfddbcba3813e209f31a42a2b92d93a2b1dcf0599ef98f357
232eff6af8f3096636a60b53ead6013cb346cee8d6250c534d6817a1bd09b931
4673133e3bb9b43ec57c3f0a607b06d78cf79c772c908bb0b90bd00877986f13
ddc60eaa7659f391221ecde591a8caa09618df4fe3ddb1e5b37c27662577e669
d139f33e4bcd89cfadc3f0f06800a457a7fd4f7c113f517402b84a807c7af131
9abd0f1bf4e90840b378b72cae05e7c799a77e92089da0a1054118f5b6ce9260
c2f01af38d4aa591931da7e5b11f2a1bb14b42f816a810f77b86b53cc9e57758
a422b46648f7a3684ef7aad22069f07a6f4875f3a227796e46e5c439ba6a4d44
49daac9cf25ccfca44fc86bafaf5b64ac96b5111022cd6e52014444d1a9ed8c4
Domains
6.tcp.eu.ngrok.io
0.tcp.eu.ngrok.io
0.tcp.in.ngrok.io
5.tcp.eu.ngrok.io
7.tcp.eu.ngrok.io
4.tcp.eu.ngrok.io
siyatermi.duckdns.org
rights-mountains.gl.at.ply.gg
2.tcp.eu.ngrok.io
jennerardar.xyz
diosadbauas.tk
4.tcp.ngrok.io
jalocliche.xyz
chardhesha.xyz
gallery-gulf.gl.at.ply.gg
ae1.localto.net
6.tcp.ngrok.io
fhgerbugjreqnhfegrb.top
jamesmillion.xyz
denestyenol.xyz
URLs
http://64.188.27.210:4483/
http://91.92.252.220:1337/
http://91.92.243.131:15108/
http://172.86.101.115:4483/
http://162.120.71.68:4483/
http://91.198.77.158:4483/
http://91.92.254.174:1334/
http://185.172.129.234:34244/
http://185.147.34.93:55615/
http://93.123.39.68:1334/
http://185.222.58.67:55615/
http://45.88.186.20:61188/
http://94.156.66.169:1334/
http://103.173.227.25:12664/
http://91.92.255.187:1334/
http://82.147.85.198:9180/
http://185.222.58.113:55615/
http://185.222.58.115:55615/
http://185.222.57.69:55615/
http://185.222.58.239:55615/
Last Seen at

Recent blog posts

post image
Release Notes: YARA Search, New Rules, Config...
watchers 246
comments 0
post image
New Redline Version: Uses Lua Bytecode, Propa...
watchers 1058
comments 0
post image
Find Malware by File Contents with YARA Searc...
watchers 2608
comments 0

What is RedLine Stealer?

RedLine Stealer or RedLine is malware that can collect users’ confidential information and deliver other malicious programs. The availability and flexibility of the stealer cause financial loss, data leakage, targeting both enterprise and personal devices. Healthcare and manufacturing sectors suffer the most from these attacks.

The malware appeared in March 2020 according to the Proofpoint investigation. Since then RedLine has just gained steam. It was on the rise during the COVID-19 pandemic and is still active. On July 1st, 2021 the malware was found on the legit-looking website that provides privacy tools. However, based on the payload analysis, only malware can be found there.

General description of RedLine malware

RedLine is an infostealer that takes information about users from browsers, systems instant messaging, and file transfer protocol clients. The main target is passwords, credit card information, username, location, autofill data, cookies, software set, and even hardware configuration like keyboard layout, UAC settings, etc. The virus is also capable of stealing cryptocurrency.

The malicious program acts as a typical stealer such as Raccoon or Pony: it uploads and downloads files, executes commands, and reports information about the infected machine. Moreover, attackers make use of RedLine to deliver ransomware, RATs, trojans, and miners.

The infostealer is quite popular as there is no problem finding it. Underground forums, C&C panels offer different options such as malware-as-a-service versions or a subscription. The price varies from $100 to $200.

One cannot tell that RedLine Stealer is a sophisticated malware like ransomware. It has the usual features typical for this family. However, it is .Net malware written in C# and the code quality is high enough to reveal an experienced programmer behind it. Cybercriminals also work hard to update malware, like downloading secondary payloads and advanced filtering features.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

RedLine malware analysis

ANY.RUN allows researchers to perform the analysis and watch the RedLine in action in an interactive sandbox simulation

redline stealer process graph

Figure 1: Displays the lifecycle of RedLine in a visual form as a process graph generated by ANY.RUN

redline stealer report

Figure 2: A customizable text report generated by ANY.RUN allows users to take an even deeper look at the malware and helps to share the research results.

RedLine Stealer execution process

Typically the execution process of that stealer is plain and straightforward. Based on the analysis, the main binary launches itself and the parent process stops. It also may be dropped from another binary or be the main binary itself. When a child process is created, the main malicious activity starts – RedLine collects information from the infected system such as passwords and others, and sends it to the Command & Control panel. When all information is collected and sent, the stealer just quits execution. Stolen information is sent in both non-encrypted and base64 encoded formats.

Distribution of RedLine

Attackers are not very creative with the delivery method of the virus. However, as the ransomware story, the method works perfectly – social engineering for different email campaigns including business email compromise, spam, fake updates, ads in Google result in malicious attachments or links. We can notice the big variety of file formats here:

  • Office
  • PDF
  • RAR and ZIP
  • Executable files
  • JavaScript

If you open the files in the attachment, RedLine will download other malicious programs.

How to detect RedLine infostealer using ANY.RUN?

At the moment, analysts can quickly recognize the info stealer because it will be tagged after Suricata IDS rules are triggered. Since the malicious program sends the stolen info to its panel just right after the start of the execution, it won't take a lot of time.

Conclusion

The best way to protect your organization or device from RedLine is to be cautious with suspicious files and links that get into your email. Your staff should be aware that even trustworthy sources can lead to infection and password or other credentials’ theft. It won’t take long to check a file in a sandbox such as ANY.RUN. Several minutes will be enough to detect RedLine and you will be good to go. Stay safe.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy