RedLine Stealer - Distribution Methods
File types, delivery vectors, and hosting infrastructure used to distribute RedLine Stealer.
Last updated: 2026-04-18
Understanding how RedLine Stealer reaches victims is critical for prevention. This page breaks down the file types used in distribution, the hosting infrastructure serving malicious payloads, and URLs tracked by URLhaus. Data is updated daily.
What Distribution Data Tells You
Shifts in file type distribution often signal changes in delivery tactics. For example, a move from .exe to .msi files may indicate operators adapting to Windows SmartScreen or email gateway filtering. A surge in .js or .vbs files suggests script-based delivery through phishing emails. Monitoring these patterns helps you tune your email security gateway rules and endpoint protection policies to block the current delivery method before it reaches end users.
Hosting Infrastructure
The hosting data below shows which domains and servers are actively distributing RedLine Stealer payloads. Add these to your DNS blocklists, web proxy deny rules, and firewall policies. Hosting infrastructure tends to rotate frequently as takedowns occur, so check this page regularly. All URL data is sourced from URLhaus. For hash-based indicators, see the IOC page. For sample details, see RedLine Stealer samples.
Malicious Distribution URLs (50)
https://anondrop.net/1408852323941224540 https://anondrop.net/1408850133260435466 https://anondrop.net/1408851068389163010 https://anondrop.net/1408850362915361032 http://88.99.145.13:444/?anondrop.net_scampage https://anondrop.net/1408850668046913618 https://anondrop.net/1408851906733805629 https://anondrop.net/1408851485831336028 https://github.com/RZM-CRACK-TEAM/RedLine-CRACK/blob/main/Redline-crack-by-rzt.zip https://bitbucket.org/x98989/8678678ff/downloads/fasdqweqw.dotm https://bitbucket.org/x98989/8678678ff/downloads/word.zip https://raw.githubusercontent.com/lakrica0/asdfqw/main/wind.exe https://upload.venomtools.in/build.exe http://185.215.113.16/inc/Lead_dumper.exe https://potok.cash/date.exe http://gdx.o7lab.me/.exe http://github.com/IgorAlaf/Creds/raw/main/marsel.exe http://lawyer.webstylze.com/wp-secure/build.exe http://91.229.239.92/deamon01/centralproductpro.zip http://91.229.239.92/deamon01/Muudwq.dat http://91.229.239.92/deamon01/Svjmgnl.mp3 http://91.229.239.92/deamon01/Cnwxvwskab.mp3 http://87.120.127.223/panel/uploads/Afocvkc.dat http://77.105.161.194/file/Solara.exe http://79.137.203.231/setup.exe https://178.32.6.100/ChromeUpdater.exe https://mussangroup.com/wp-content/images/pic12.jpg http://185.215.113.16/inc/cookie250.exe http://193.3.19.108/Meta.jpg http://162.250.98.10/54t45t564.exe http://162.250.98.10/GY856678.exe https://birthingamerica.com/wp-content/server/WF34g534ve3.rar http://195.10.205.102:1911/SorterObjectArrayNegateSaturate.dll https://zjnaodxjdddaca1zts.he8lcxaow2z60y2.ru/meta2406.exe http://orderhalalfoods.com/meta2406.exe http://findhalalrestaurants.com/meta2406.exe https://0yjipr61l4hff6u.jhsa1gggqgdjpe.ru/meta2406.exe https://wyfahwr92ethixzvj1.iooey4moqjlvcpu.ru/meta2406.exe https://vg9uaonmlovvvey0ym.bezkngteaqr.ru/meta2406.exe http://aiyerslogistics.com/meta2406.exe https://sfipgnixygv.a4dbezwb3na.ru/meta2406.exe https://eupaxg3qnc.zvmdyjjavbo9au.ru/meta2406.exe https://zj1gop8a7taggs.hgrpxnjs.ru/meta2406.exe https://e32wdnmr.wgjghqu6k.ru/meta2406.exe https://yrv5cccb.2jjepju42.ru/meta2406.exe https://pes8edr5g.hvstcyzsdd.ru/meta2406.exe https://c4musqgiix.zvmdyjjavbo9au.ru/meta2406.exe https://kes1ljwb7u.cv2qil2savvgpk.ru/meta2406.exe https://ftocmcwayyukkdgsc.bbwizxq4prat.ru/meta2406.exe https://z0h5zwqcnshucs3mbk.ppyqeptelvilg7o.ru/meta2406.exe
Source: URLhaus (abuse.ch). Updated: 2026-04-18
Hosting Infrastructure
| Host | URLs |
|---|---|
| anondrop.net | 7 |
| 91.229.239.92 | 4 |
| github.com | 2 |
| bitbucket.org | 2 |
| 185.215.113.16 | 2 |
| 162.250.98.10 | 2 |
| 88.99.145.13 | 1 |
| raw.githubusercontent.com | 1 |
| upload.venomtools.in | 1 |
| potok.cash | 1 |
| gdx.o7lab.me | 1 |
| lawyer.webstylze.com | 1 |
| 87.120.127.223 | 1 |
| 77.105.161.194 | 1 |
| 79.137.203.231 | 1 |
| 178.32.6.100 | 1 |
| mussangroup.com | 1 |
| 193.3.19.108 | 1 |
| birthingamerica.com | 1 |
| 195.10.205.102 | 1 |