Redline Stealer
Description
RedLine Stealer is commodity malware. It is available for sale via underground forums and various chat apps such as Telegram and WhatsApp typically from $100-$150 USD. It operates using the MaaS (malware-as-a-service) business model. Created with .NET, this malware family made its debut in 2020. It is designed to collect sensitive information from infected devices such as:
saved credentials
credit card information
crypto-wallets
autocomplete data
cookies
data from several programs such as Discord, Steam, FileZilla, email clients, IM clients, password managers, and others
Updates to RedLine Stealer also include RAT functions, allowing it to upload and download files as well as execute commands. While this family typically uses its own C2 servers, some variants have been known to use public repositories such as GitHub in order to pose as legitimate outgoing traffic.
The latest versions of Redline Stealer enable more stealthy operations by leveraging Lua bytecode to obfuscate malicious strings and avoid common, easily detected scripts.
As of 2026, RedLine Stealer remains active primarily through repackaged and legacy builds. This follows disruption of its infrastructure in Operation Magnus, with no confirmed new major developments in functionality.
Aliases
- Redline Loader
- RedLine Stealer
- Redline
Targeted Industries
- All
Objectives
Data Theft
Known Infection Vectors
- Phishing
- Spearphishing
- Bundled with other malware
- Fake blockchain games
- Fake sponsored ads for free downloads of ChatGPT and Google Bard
References
Excel Document Delivers Multiple Malware by Exploiting CVE-2017-11882 Part II (Fortinet)
https://www.fortinet.com/blog/threat-research/excel-document-delivers-multiple-malware-exploiting-cve-2017-11882-part-two
RedLine Stealer (Malpedia)
https://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
U.S. Joins International Action Against RedLine and META Infostealers
https://www.justice.gov/usao-wdtx/pr/us-joins-international-action-against-redline-and-meta-infostealers
Maxim Alexandrovich Rudometov & RedLine (Rewards For Justice)
https://rewardsforjustice.net/rewards/maxim-alexandrovich-rudometov-redline/
Armenian Man Extradited to U.S. Faces Charges for Role in Infostealing Malware Scheme (U.S. Department of Justice)
https://www.justice.gov/usao-wdtx/pr/armenian-man-extradited-us-faces-charges-role-infostealing-malware-scheme