BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
3
Global rank
8
Month rank
10 infographic chevron week
Week rank
3250
IOCs

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Stealer
Type
ex-USSR
Origin
1 March, 2020
First seen
29 March, 2024
Last seen
Also known as
RedLine

How to analyze RedLine Stealer with ANY.RUN

Type
ex-USSR
Origin
1 March, 2020
First seen
29 March, 2024
Last seen

IOCs

IP addresses
185.215.113.67
185.172.128.33
5.42.65.101
5.42.65.0
41.216.183.150
4.185.137.132
83.97.73.122
65.21.119.55
15.235.131.20
194.87.107.145
85.209.88.31
5.42.65.68
193.161.193.99
185.106.93.193
45.15.156.142
45.15.156.127
5.206.227.233
34.31.226.230
193.233.20.28
193.124.22.27
Hashes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0.tcp.eu.ngrok.io
6.tcp.eu.ngrok.io
2.tcp.eu.ngrok.io
4.tcp.eu.ngrok.io
7.tcp.eu.ngrok.io
5.tcp.eu.ngrok.io
4.tcp.ngrok.io
chardhesha.xyz
jalocliche.xyz
0.tcp.in.ngrok.io
gallery-gulf.gl.at.ply.gg
ae1.localto.net
6.tcp.ngrok.io
fhgerbugjreqnhfegrb.top
jamesmillion.xyz
exirdonanos.xyz
denestyenol.xyz
design-invited.at.ply.gg
greatredking.duckdns.org
termsiya.duckdns.org
URLs
http://91.198.77.158:4483/
http://91.92.254.174:1334/
http://185.172.129.234:34244/
http://185.147.34.93:55615/
http://93.123.39.68:1334/
http://185.222.58.67:55615/
http://45.88.186.20:61188/
http://94.156.66.169:1334/
http://103.173.227.25:12664/
http://91.92.255.187:1334/
http://82.147.85.198:9180/
http://185.222.58.113:55615/
http://185.222.58.115:55615/
http://185.222.57.69:55615/
http://185.222.58.239:55615/
http://198.244.227.83:6985/
http://178.33.57.150:1334/
http://185.222.58.99:55615/
http://91.92.243.247:1334/
http://185.222.58.246:55615/
Last Seen at
Last Seen at

Recent blog posts

post image
Basic Malware Packers: What are They and How...
watchers 734
comments 0
post image
New BunnyLoader Version Gains Modular Capabil...
watchers 232
comments 0
post image
What are Threat Intelligence Feeds? 
watchers 195
comments 0

What is RedLine Stealer?

RedLine Stealer or RedLine is malware that can collect users’ confidential information and deliver other malicious programs. The availability and flexibility of the stealer cause financial loss, data leakage, targeting both enterprise and personal devices. Healthcare and manufacturing sectors suffer the most from these attacks.

The malware appeared in March 2020 according to the Proofpoint investigation. Since then RedLine has just gained steam. It was on the rise during the COVID-19 pandemic and is still active. On July 1st, 2021 the malware was found on the legit-looking website that provides privacy tools. However, based on the payload analysis, only malware can be found there.

General description of RedLine malware

RedLine is an infostealer that takes information about users from browsers, systems instant messaging, and file transfer protocol clients. The main target is passwords, credit card information, username, location, autofill data, cookies, software set, and even hardware configuration like keyboard layout, UAC settings, etc. The virus is also capable of stealing cryptocurrency.

The malicious program acts as a typical stealer such as Raccoon or Pony: it uploads and downloads files, executes commands, and reports information about the infected machine. Moreover, attackers make use of RedLine to deliver ransomware, RATs, trojans, and miners.

The infostealer is quite popular as there is no problem finding it. Underground forums, C&C panels offer different options such as malware-as-a-service versions or a subscription. The price varies from $100 to $200.

One cannot tell that RedLine Stealer is a sophisticated malware like ransomware. It has the usual features typical for this family. However, it is .Net malware written in C# and the code quality is high enough to reveal an experienced programmer behind it. Cybercriminals also work hard to update malware, like downloading secondary payloads and advanced filtering features.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

RedLine malware analysis

ANY.RUN allows researchers to perform the analysis and watch the RedLine in action in an interactive sandbox simulation

redline stealer process graph

Figure 1: Displays the lifecycle of RedLine in a visual form as a process graph generated by ANY.RUN

redline stealer report

Figure 2: A customizable text report generated by ANY.RUN allows users to take an even deeper look at the malware and helps to share the research results.

RedLine Stealer execution process

Typically the execution process of that stealer is plain and straightforward. Based on the analysis, the main binary launches itself and the parent process stops. It also may be dropped from another binary or be the main binary itself. When a child process is created, the main malicious activity starts – RedLine collects information from the infected system such as passwords and others, and sends it to the Command & Control panel. When all information is collected and sent, the stealer just quits execution. Stolen information is sent in both non-encrypted and base64 encoded formats.

Distribution of RedLine

Attackers are not very creative with the delivery method of the virus. However, as the ransomware story, the method works perfectly – social engineering for different email campaigns including business email compromise, spam, fake updates, ads in Google result in malicious attachments or links. We can notice the big variety of file formats here:

  • Office
  • PDF
  • RAR and ZIP
  • Executable files
  • JavaScript

If you open the files in the attachment, RedLine will download other malicious programs.

How to detect RedLine infostealer using ANY.RUN?

At the moment, analysts can quickly recognize the info stealer because it will be tagged after Suricata IDS rules are triggered. Since the malicious program sends the stolen info to its panel just right after the start of the execution, it won't take a lot of time.

Conclusion

The best way to protect your organization or device from RedLine is to be cautious with suspicious files and links that get into your email. Your staff should be aware that even trustworthy sources can lead to infection and password or other credentials’ theft. It won’t take long to check a file in a sandbox such as ANY.RUN. Several minutes will be enough to detect RedLine and you will be good to go. Stay safe.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy