BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
4
Global rank
8
Month rank
9 infographic chevron week
Week rank
3440
IOCs

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Stealer
Type
ex-USSR
Origin
1 March, 2020
First seen
27 July, 2024
Last seen
Also known as
RedLine

How to analyze RedLine Stealer with ANY.RUN

Type
ex-USSR
Origin
1 March, 2020
First seen
27 July, 2024
Last seen

IOCs

IP addresses
20.52.165.210
178.23.190.118
85.28.47.132
154.81.220.233
45.140.147.183
185.215.113.16
185.215.113.67
51.195.145.80
91.92.248.117
65.21.101.232
84.38.129.21
185.237.165.67
62.204.41.166
31.177.108.53
5.42.92.213
185.196.9.26
185.173.38.88
57.128.132.216
45.83.31.49
204.14.75.2
Hashes
56a2ce8e0e57dac8472377f2f3c4286a72ffe1326ee568b9632ce7d25961bbe0
c8983df41e78ab738b55d9f8f2c1490eefae64d5d8dfbab945b255713094facc
f9670a844453e56898ed4c23afe57dfa2cd20f28ae8e97df4c7304371e1b179b
9ced56e34d54ae707ee88b0e174bdb9672442b9fc7a42805de417ec54ebd1e1d
af54a35dd3ce3d2584bcc29d858664b3fc7304f0996d7bf07f6ae95e75c5e698
6b96f6652af99c513bbe89a4c5e61e2729aa1f67ce0c0c3d0ca28d2959dcd82c
b82336416abb694b2feae39c555e7ddb42fe99de4f302c8e243f876ea9529f0e
403286f93a4aedc002bc1bb4969e367683dec9fb9218e79fa97c219e7cb94ceb
2e4b184350f61fa493169ca820d9c488fd4c0dd4891d2bcc82b1d7cad137d4a4
e08da1e1ee8b136cb4bd34f7f014816d628e2f5212077112a1a4c9bd3a2078cd
dcaf0cbba1ce1a207e8a6493aeac9cdc71b0b266903d3365875b027cef77ab9a
2b8416027771d98074103d1b3e795cb8f458d4b56c1f01c50bba0b9cc291de4f
cccd52f20b805e1df2920afa9a4abc78aefcff907e99ed7f94fdb46a889d30c6
c5840e7c7117b70b7f39b73197f32b0475e72a2f3013ff7ccbb3c88f45ba05cc
1cec72217712823f2227db94f941d446594250cfb66632c87c879c3bd90d5e9f
d278fdd82c7df98c9b192b792355009c5e8c8fb8e4ba3a5f3d386b9d28c6e114
2e3eacc221560bc297574bd30da52d559ae466c2896ac783f9b2512fa2e69fcd
cc7bcdfee502f5cc0c042b3a97ef737afa5cccb46a2dadaa02bcf74faf6fd8ac
1236cb6082ac8e5a19982344f25b020082bd0936e2e5b576f8b3a02703a40dd5
e298f86eab0e2f44603b7640af6f89269dd2e00115e778f3d2e6bddde0a5f39c
Domains
thomas-partly.gl.at.ply.gg
billred229102.duckdns.org
5.tcp.eu.ngrok.io
0.tcp.eu.ngrok.io
amrican-sport-live-stream.cc
strategy-surfing.gl.at.ply.gg
2.tcp.eu.ngrok.io
pst-child.gl.at.ply.gg
list-enjoyed.gl.at.ply.gg
microsoft-andreas.gl.at.ply.gg
yabynennet.xyz
4.tcp.eu.ngrok.io
7.tcp.eu.ngrok.io
daddy.linkpc.net
people-climbing.gl.at.ply.gg
0.tcp.in.ngrok.io
ns.edahua.top
4.tcp.ngrok.io
6.tcp.eu.ngrok.io
beshomandotestbesnd.run.place
URLs
http://154.81.220.233:28105/
http://billred229102.duckdns.org:26546/
http://91.92.248.117:65012/
http://204.14.75.2:16383/
http://94.156.8.186:37552/
http://185.222.57.153:55615/
http://161.129.65.145:4483/
http://45.137.22.124:55615/
http://185.222.58.91:55615/
http://79.110.49.209:37552/
http://185.222.58.79:55615/
http://95.142.46.3:49743/
http://185.222.58.77:55615/
http://45.137.22.68:55615/
http://45.137.22.67:55615/
http://beshomandotestbesnd.run.place:1111/
http://94.156.8.28:65012/
http://94.156.8.229:1334/
http://195.10.205.91:1707/
http://64.188.27.210:4483/
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 178
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1013
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 3000
comments 0

What is RedLine Stealer?

RedLine Stealer or RedLine is malware that can collect users’ confidential information and deliver other malicious programs. The availability and flexibility of the stealer cause financial loss, data leakage, targeting both enterprise and personal devices. Healthcare and manufacturing sectors suffer the most from these attacks.

The malware appeared in March 2020 according to the Proofpoint investigation. Since then RedLine has just gained steam. It was on the rise during the COVID-19 pandemic and is still active. On July 1st, 2021 the malware was found on the legit-looking website that provides privacy tools. However, based on the payload analysis, only malware can be found there.

General description of RedLine malware

RedLine is an infostealer that takes information about users from browsers, systems instant messaging, and file transfer protocol clients. The main target is passwords, credit card information, username, location, autofill data, cookies, software set, and even hardware configuration like keyboard layout, UAC settings, etc. The virus is also capable of stealing cryptocurrency.

The malicious program acts as a typical stealer such as Raccoon or Pony: it uploads and downloads files, executes commands, and reports information about the infected machine. Moreover, attackers make use of RedLine to deliver ransomware, RATs, trojans, and miners.

The infostealer is quite popular as there is no problem finding it. Underground forums, C&C panels offer different options such as malware-as-a-service versions or a subscription. The price varies from $100 to $200.

One cannot tell that RedLine Stealer is a sophisticated malware like ransomware. It has the usual features typical for this family. However, it is .Net malware written in C# and the code quality is high enough to reveal an experienced programmer behind it. Cybercriminals also work hard to update malware, like downloading secondary payloads and advanced filtering features.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

RedLine malware analysis

ANY.RUN allows researchers to perform the analysis and watch the RedLine in action in an interactive sandbox simulation

redline stealer process graph

Figure 1: Displays the lifecycle of RedLine in a visual form as a process graph generated by ANY.RUN

redline stealer report

Figure 2: A customizable text report generated by ANY.RUN allows users to take an even deeper look at the malware and helps to share the research results.

RedLine Stealer execution process

Typically the execution process of that stealer is plain and straightforward. Based on the analysis, the main binary launches itself and the parent process stops. It also may be dropped from another binary or be the main binary itself. When a child process is created, the main malicious activity starts – RedLine collects information from the infected system such as passwords and others, and sends it to the Command & Control panel. When all information is collected and sent, the stealer just quits execution. Stolen information is sent in both non-encrypted and base64 encoded formats.

Distribution of RedLine

Attackers are not very creative with the delivery method of the virus. However, as the ransomware story, the method works perfectly – social engineering for different email campaigns including business email compromise, spam, fake updates, ads in Google result in malicious attachments or links. We can notice the big variety of file formats here:

  • Office
  • PDF
  • RAR and ZIP
  • Executable files
  • JavaScript

If you open the files in the attachment, RedLine will download other malicious programs.

How to detect RedLine infostealer using ANY.RUN?

At the moment, analysts can quickly recognize the info stealer because it will be tagged after Suricata IDS rules are triggered. Since the malicious program sends the stolen info to its panel just right after the start of the execution, it won't take a lot of time.

Conclusion

The best way to protect your organization or device from RedLine is to be cautious with suspicious files and links that get into your email. Your staff should be aware that even trustworthy sources can lead to infection and password or other credentials’ theft. It won’t take long to check a file in a sandbox such as ANY.RUN. Several minutes will be enough to detect RedLine and you will be good to go. Stay safe.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More