GOLD BLADE remote DLL sideloading attack deploys RedLoader
A new infection chain for GOLD BLADE's RedLoader malware has been identified, combining previously separate techniques. The attack begins with a malicious PDF link, leading to a ZIP archive containing a LNK file masquerading as a PDF. This file executes conhost.exe, which uses WebDAV to contact a CloudFlare domain and remotely sideload a malicious DLL. The infection progresses through two stages of RedLoader, ultimately establishing command and control communication. This updated method, observed in July 2025, demonstrates the threat actors' ability to adapt and bypass defenses by combining known techniques in novel ways.
AI Analysis
Technical Summary
The GOLD BLADE threat group has developed a novel infection chain to deploy their RedLoader malware, leveraging a remote DLL sideloading technique. The attack initiates with a malicious PDF link that entices the victim to download a ZIP archive. Inside this archive is a LNK (Windows shortcut) file disguised as a PDF document. When the victim executes this LNK file, it launches the legitimate Windows process conhost.exe. This process is then abused to perform a WebDAV request to a CloudFlare-hosted domain, from which it remotely sideloads a malicious DLL. DLL sideloading is a technique where a legitimate executable loads a malicious DLL, bypassing traditional security controls that might block direct execution of malware. The infection proceeds in two stages of RedLoader malware, ultimately establishing command and control (C2) communication channels to enable further malicious activities such as data exfiltration, persistence, or lateral movement. This attack chain combines multiple MITRE ATT&CK techniques: T1566 (Phishing), T1204 (User Execution), T1218 (Signed Binary Proxy Execution), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), T1547.001 (Registry Run Keys/Startup Folder), and T1573 (Encrypted Channel). Observed in July 2025, this method demonstrates the adversary's ability to adapt and combine known techniques in novel ways to evade detection and bypass defenses. Indicators of compromise include specific file hashes and CloudFlare worker domains used for hosting malicious payloads. No CVE or patch is currently available, and no known exploits in the wild have been reported yet, but the sophistication and stealth of the attack chain pose a significant risk to targeted organizations.
Potential Impact
For European organizations, the GOLD BLADE RedLoader infection chain represents a medium to high risk due to its stealthy execution and multi-stage payload delivery. The use of legitimate Windows binaries (conhost.exe) for DLL sideloading complicates detection by traditional antivirus and endpoint detection and response (EDR) solutions. Successful compromise could lead to unauthorized access, data theft, espionage, or disruption of critical services. Given the use of phishing and social engineering to initiate the attack, organizations with large user bases or those that frequently handle PDF documents are particularly vulnerable. The establishment of encrypted C2 channels enables persistent and covert communication, increasing the difficulty of incident response and remediation. The attack's reliance on CloudFlare domains for payload hosting may complicate attribution and takedown efforts. European entities in sectors such as finance, government, healthcare, and critical infrastructure could face significant operational and reputational damage if targeted. Additionally, the evolving nature of the attack chain indicates that threat actors are actively refining their tactics, which may lead to broader adoption and increased attack frequency in the near future.
Mitigation Recommendations
1. Implement advanced email filtering and phishing detection solutions to block malicious PDF links and ZIP attachments before reaching end users. 2. Educate users on the risks of opening unexpected attachments, especially those masquerading as PDFs but are actually LNK files. 3. Employ application whitelisting and restrict execution of LNK files from email or untrusted directories. 4. Monitor and restrict the use of conhost.exe and other signed Windows binaries for anomalous network activity, particularly WebDAV requests to unusual external domains. 5. Deploy endpoint detection and response (EDR) tools capable of detecting DLL sideloading and process injection techniques. 6. Use network monitoring to identify suspicious outbound connections to CloudFlare worker domains or other uncommon hosts. 7. Regularly audit and harden registry run keys and startup folders to prevent persistence mechanisms. 8. Maintain up-to-date threat intelligence feeds and indicators of compromise (IOCs) to enable rapid detection and response. 9. Consider network segmentation and least privilege principles to limit lateral movement if a system is compromised. 10. Conduct regular security awareness training focusing on social engineering and spear-phishing tactics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: d302836c7df9ce8ac68a06b53263e2c685971781a48ce56b3b5a579c5bba10cc
- hash: f5203c7ac07087fd5029d83141982f0a5e78f169cdc4ab9fc097cc0e2981d926
- hash: 369acb06aac9492df4d174dbd31ebfb1e6e0c5f3
- domain: automatinghrservices.workers.dev
- domain: quiet.msftlivecloudsrv.workers.dev
- domain: live.airemoteplant.workers.dev
GOLD BLADE remote DLL sideloading attack deploys RedLoader
Description
A new infection chain for GOLD BLADE's RedLoader malware has been identified, combining previously separate techniques. The attack begins with a malicious PDF link, leading to a ZIP archive containing a LNK file masquerading as a PDF. This file executes conhost.exe, which uses WebDAV to contact a CloudFlare domain and remotely sideload a malicious DLL. The infection progresses through two stages of RedLoader, ultimately establishing command and control communication. This updated method, observed in July 2025, demonstrates the threat actors' ability to adapt and bypass defenses by combining known techniques in novel ways.
AI-Powered Analysis
Technical Analysis
The GOLD BLADE threat group has developed a novel infection chain to deploy their RedLoader malware, leveraging a remote DLL sideloading technique. The attack initiates with a malicious PDF link that entices the victim to download a ZIP archive. Inside this archive is a LNK (Windows shortcut) file disguised as a PDF document. When the victim executes this LNK file, it launches the legitimate Windows process conhost.exe. This process is then abused to perform a WebDAV request to a CloudFlare-hosted domain, from which it remotely sideloads a malicious DLL. DLL sideloading is a technique where a legitimate executable loads a malicious DLL, bypassing traditional security controls that might block direct execution of malware. The infection proceeds in two stages of RedLoader malware, ultimately establishing command and control (C2) communication channels to enable further malicious activities such as data exfiltration, persistence, or lateral movement. This attack chain combines multiple MITRE ATT&CK techniques: T1566 (Phishing), T1204 (User Execution), T1218 (Signed Binary Proxy Execution), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), T1547.001 (Registry Run Keys/Startup Folder), and T1573 (Encrypted Channel). Observed in July 2025, this method demonstrates the adversary's ability to adapt and combine known techniques in novel ways to evade detection and bypass defenses. Indicators of compromise include specific file hashes and CloudFlare worker domains used for hosting malicious payloads. No CVE or patch is currently available, and no known exploits in the wild have been reported yet, but the sophistication and stealth of the attack chain pose a significant risk to targeted organizations.
Potential Impact
For European organizations, the GOLD BLADE RedLoader infection chain represents a medium to high risk due to its stealthy execution and multi-stage payload delivery. The use of legitimate Windows binaries (conhost.exe) for DLL sideloading complicates detection by traditional antivirus and endpoint detection and response (EDR) solutions. Successful compromise could lead to unauthorized access, data theft, espionage, or disruption of critical services. Given the use of phishing and social engineering to initiate the attack, organizations with large user bases or those that frequently handle PDF documents are particularly vulnerable. The establishment of encrypted C2 channels enables persistent and covert communication, increasing the difficulty of incident response and remediation. The attack's reliance on CloudFlare domains for payload hosting may complicate attribution and takedown efforts. European entities in sectors such as finance, government, healthcare, and critical infrastructure could face significant operational and reputational damage if targeted. Additionally, the evolving nature of the attack chain indicates that threat actors are actively refining their tactics, which may lead to broader adoption and increased attack frequency in the near future.
Mitigation Recommendations
1. Implement advanced email filtering and phishing detection solutions to block malicious PDF links and ZIP attachments before reaching end users. 2. Educate users on the risks of opening unexpected attachments, especially those masquerading as PDFs but are actually LNK files. 3. Employ application whitelisting and restrict execution of LNK files from email or untrusted directories. 4. Monitor and restrict the use of conhost.exe and other signed Windows binaries for anomalous network activity, particularly WebDAV requests to unusual external domains. 5. Deploy endpoint detection and response (EDR) tools capable of detecting DLL sideloading and process injection techniques. 6. Use network monitoring to identify suspicious outbound connections to CloudFlare worker domains or other uncommon hosts. 7. Regularly audit and harden registry run keys and startup folders to prevent persistence mechanisms. 8. Maintain up-to-date threat intelligence feeds and indicators of compromise (IOCs) to enable rapid detection and response. 9. Consider network segmentation and least privilege principles to limit lateral movement if a system is compromised. 10. Conduct regular security awareness training focusing on social engineering and spear-phishing tactics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://news.sophos.com/en-us/2025/07/29/gold-blade-remote-dll-sideloading-attack-deploys-redloader/"]
- Adversary
- GOLD BLADE
- Pulse Id
- 688b85368e76ec4d637aee15
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hashd302836c7df9ce8ac68a06b53263e2c685971781a48ce56b3b5a579c5bba10cc | — | |
hashf5203c7ac07087fd5029d83141982f0a5e78f169cdc4ab9fc097cc0e2981d926 | — | |
hash369acb06aac9492df4d174dbd31ebfb1e6e0c5f3 | — |
Domain
Value | Description | Copy |
---|---|---|
domainautomatinghrservices.workers.dev | — | |
domainquiet.msftlivecloudsrv.workers.dev | — | |
domainlive.airemoteplant.workers.dev | — |
Threat ID: 688b891aad5a09ad00b9196e
Added to database: 7/31/2025, 3:17:46 PM
Last enriched: 7/31/2025, 3:33:34 PM
Last updated: 8/1/2025, 8:18:50 AM
Views: 6
Related Threats
Indian Infrastructure Targeted with Desktop Lures and Poseidon Backdoor
MediumUnmasking LockBit: A Deep Dive into DLL Sideloading and Masquerading Tactics
MediumRussia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware
MediumThreatFox IOCs for 2025-07-31
MediumMaaS Appeal: An Infostealer Rises From The Ashes
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.