{"id":5094,"date":"2025-07-31T00:19:12","date_gmt":"2025-07-31T00:19:12","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=5094"},"modified":"2025-07-31T00:19:12","modified_gmt":"2025-07-31T00:19:12","slug":"gold-blade-distant-dll-sideloading-assault-deploys-redloader-sophos-information","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=5094","title":{"rendered":"GOLD BLADE distant DLL sideloading assault deploys RedLoader \u2013 Sophos Information"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Sophos analysts are investigating a brand new an infection chain for the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.secureworks.com\/research\/threat-profiles\/gold-blade\">GOLD BLADE<\/a> cybercriminal group\u2019s customized RedLoader malware, which initiates command and management (C2) communications. The menace actors leverage a LNK file to remotely execute and sideload a benign executable, which masses the RedLoader stage 1 payload that&#8217;s hosted on GOLD BLADE infrastructure. The menace actors beforehand used these methods individually: using WebDAV to execute remotely hosted DLLs was noticed in September 2024, and the sideloading of a renamed ADNotificationManager.exe file was noticed in March 2025. Nonetheless, the mixture noticed in July 2025 represents a technique for preliminary execution that has not been publicly reported.<\/p>\n<h3>Execution chain<\/h3>\n<p>Determine 1 illustrates the execution chain. The assault begins with a menace actor sending a well-crafted cowl letter PDF to a goal by way of a third-party job web site akin to \u2018certainly.com\u2019.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/07\/GOLDBLADE2507-figure1chart.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-962107\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/07\/GOLDBLADE2507-figure1chart.png\" alt=\"\" width=\"640\" height=\"394\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/07\/GOLDBLADE2507-figure1chart.png 1674w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/07\/GOLDBLADE2507-figure1chart.png?resize=300,185 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/07\/GOLDBLADE2507-figure1chart.png?resize=768,473 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/07\/GOLDBLADE2507-figure1chart.png?resize=1024,630 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2025\/07\/GOLDBLADE2507-figure1chart.png?resize=1536,945 1536w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\"\/><\/a><\/p>\n<p><em>Determine 1: The noticed RedLoader execution chain<\/em><\/p>\n<ol>\n<li>A malicious hyperlink within the PDF downloads a ZIP archive to the sufferer\u2019s system. The archive incorporates a LNK file that masquerades as a PDF.<\/li>\n<li>The LNK file executes conhost.exe.<\/li>\n<li>This executable leverages WebDAV to contact a CloudFlare area (automatinghrservices[.] staff[.]dev). A renamed signed model of the Adobe ADNotificationManager.exe executable masquerades as a resume and is remotely hosted on the attacker-controlled server (dav[.]automatinghrservices[.]staff[.]dev @ SSLDavWWWRootCV-APP-2012-68907872.exe). This file resides in the identical listing because the RedLoader stage 1 DLL file (netutils.dll).<\/li>\n<li>Upon execution, the renamed benign executable remotely sideloads the malicious DLL (netutils.dll), marking the start of the RedLoader an infection chain.<\/li>\n<li>RedLoader stage 1 creates a scheduled activity named \u2018BrowserQEBrowserQE<em>_<base64-encoded computer=\"\" name=\"\"\/><\/em>\u2019 on the sufferer\u2019s system and downloads a standalone executable for stage 2 from \u2018reside[.]airemoteplant[.]staff[.]dev\u2019. The usage of a standalone executable deviates from the exercise noticed in September 2024 and resembles the an infection chain that Development Micro <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/c\/unveiling-earth-kapre-aka-redcurls-cyberespionage-tactics-with-t.html\">reported<\/a> in March 2024.<\/li>\n<li>The scheduled activity makes use of PCALua.exe and conhost.exe to execute RedLoader stage 2, a customized executable named \u2018BrowserQE_<em><base64-encoded computer=\"\" name=\"\"\/><\/em>.exe\u2019. Whereas this executable identify is victim-specific, the SHA256 hash is constant throughout all samples noticed by Sophos analysts.<\/li>\n<li>RedLoader stage 2 communicates with its C2 server.<\/li>\n<\/ol>\n<h3>Mitigations<\/h3>\n<p>The July exercise reveals how menace actors can mix prior methods to switch their assault chain and bypass defenses. GOLD BLADE continues to rely closely on LNK recordsdata that impersonate different file varieties. Organizations can mitigate this menace by deploying a Software program Restriction Coverage Group Coverage Object that <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.vicarius.io\/vsociety\/posts\/block-execution-of-lnk-files-in-specified-folders\">blocks<\/a> LNK file execution from frequent directories leveraged by malware. These directories embrace \u2018C:Customers*Downloads*.lnk\u2019, \u2018%AppDataLocal%*.lnk\u2019, and \u2018%AppDataRoaming%*.lnk\u2019.<\/p>\n<p>The Sophos protections listed in Desk 1 will tackle this exercise.<\/p>\n<table width=\"100%\">\n<thead>\n<tr>\n<td width=\"43%\"><strong>Title<\/strong><\/td>\n<td width=\"56%\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"43%\">Evade_28k<\/td>\n<td width=\"56%\">Blocks particular variations of adnotificationmanager.exe no matter<br \/>DLL identify from DLL sideloading<\/td>\n<\/tr>\n<tr>\n<td width=\"43%\">WIN-DET-EVADE-HEADLESS-CONHOST-EXECUTION-1<\/td>\n<td width=\"56%\">Identifies suspicious youngster processes of conhost.exe the place the<br \/>course of path just isn&#8217;t \u2018Windowssplwow64.exe\u2019,<br \/>\u2018WindowsSystem32WerFault.exe\u2019, or<br \/>\u2018WindowsSystem32conhost.exe\u2019<\/td>\n<\/tr>\n<tr>\n<td width=\"43%\">Troj\/Agent-BLKU<\/td>\n<td width=\"56%\">Static detection for RedLoader stage 2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Desk 1: Sophos countermeasures overlaying this menace.<\/em><\/p>\n<p>To mitigate publicity to this malware, organizations can use obtainable controls to assessment and prohibit entry utilizing the indications listed in Desk 2. The domains might comprise malicious content material, so contemplate the dangers earlier than opening them in a browser. A CSV file containing IoCs talked about in is put up is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/sophoslabs\/IoCs\/blob\/master\/2507%20Gold%20Blade%20DLL%20sideloading%20RedLoader.csv\">obtainable<\/a> from our Github repository.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"264\"><strong>Indicator<\/strong><\/td>\n<td width=\"108\"><strong>Sort<\/strong><\/td>\n<td width=\"252\"><strong>Context<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"264\">automatinghrservices[.]staff[.]dev<\/td>\n<td width=\"108\">Area identify<\/td>\n<td width=\"252\">GOLD BLADE C2 server<\/td>\n<\/tr>\n<tr>\n<td width=\"264\">quiet[.]msftlivecloudsrv[.]staff[.]dev<\/td>\n<td width=\"108\">Area identify<\/td>\n<td width=\"252\">GOLD BLADE C2 server<\/td>\n<\/tr>\n<tr>\n<td width=\"264\">reside[.]airemoteplant[.]staff[.]dev<\/td>\n<td width=\"108\">Area identify<\/td>\n<td width=\"252\">GOLD BLADE C2 server<\/td>\n<\/tr>\n<tr>\n<td width=\"264\">netutils.dll<\/td>\n<td width=\"108\">Filename<\/td>\n<td width=\"252\">RedLoader stage 1 deployed by GOLD BLADE by way of distant DLL sideloading<\/td>\n<\/tr>\n<tr>\n<td width=\"264\">d302836c7df9ce8ac68a06b53263e2c685971781a48ce56b3b5a579c5bba10cc<\/td>\n<td width=\"108\">SHA256 hash<\/td>\n<td width=\"252\">RedLoader stage 1 deployed by GOLD BLADE by way of distant DLL sideloading<\/td>\n<\/tr>\n<tr>\n<td width=\"264\">f5203c7ac07087fd5029d83141982f0a5e78f169cdc4ab9fc097cc0e2981d926<\/td>\n<td width=\"108\">SHA256 hash<\/td>\n<td width=\"252\">RedLoader stage 2 deployed by GOLD BLADE<\/td>\n<\/tr>\n<tr>\n<td width=\"264\">369acb06aac9492df4d174dbd31ebfb1e6e0c5f3<\/td>\n<td width=\"108\">SHA1 hash<\/td>\n<td width=\"252\">RedLoader stage 2 deployed by GOLD BLADE<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Desk 2: Indicators for this menace.<\/em><\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Sophos analysts are investigating a brand new an infection chain for the GOLD BLADE cybercriminal group\u2019s customized RedLoader malware, which initiates command and management (C2) communications. The menace actors leverage a LNK file to remotely execute and sideload a benign executable, which masses the RedLoader stage 1 payload that&#8217;s hosted on GOLD BLADE infrastructure. The [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5096,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[717,4380,1535,4381,4379,121,4382,1151,1947,120],"class_list":["post-5094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-attack","tag-blade","tag-deploys","tag-dll","tag-gold","tag-news","tag-redloader","tag-remote","tag-sideloading","tag-sophos"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5094"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5094\/revisions"}],"predecessor-version":[{"id":5095,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5094\/revisions\/5095"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/5096"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-15 00:18:52 UTC -->