Wednesday, April 23, 2025
HomeCyber CrimeRedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins

RedLine Malware Weaponizing Pirated Corporate Softwares To Steal Logins

Published on

SIEM as a Service

Follow Us on Google News

Attackers are distributing a malicious .NET-based HPDxLIB activator disguised as a new version, which is signed with a self-signed certificate, and targets entrepreneurs automating business processes and aims to compromise their systems.

They are distributing malicious activators on forums targeting business owners and accountants, deceptively promoting them as legitimate license bypass tools with update functionality while concealing a hidden malicious payload.

HPDxLIB assembly, a component of pirated software, is flagged by security software as potentially containing the RedLine stealer.

- Advertisement - Google News

Despite warnings, users are still instructed to disable security measures to run the software, increasing their risk of malware infection.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Pirated Corporate Softwares Weaponized
Pirated Corporate Softwares Weaponized

By distributing a malicious dynamic library disguised as a legitimate one, they deceive users into replacing the file that was originally installed. 

When the patched software is launched, the malicious library is loaded by the legitimate process, leading to the execution of a stealer that exploits user trust rather than software vulnerabilities.

The malicious techsys.dll contains a resource, loader.hpdx.dll (or its compressed version, loader.hz), which is heavily obfuscated and, despite being difficult to analyze statically, contains a large suspicious data block, indicating potential malicious activity.

The byte sequence is an encrypted payload, likely containing the RedLine stealer, which is structured as an `EncryptedContainer`, with fields for a magic byte, XOR key, big-endian and little-endian size indicators, encrypted data, and end bytes, used to initialize a variable within the library’s code.

Sequence of byte

Data is initially XOR-encrypted with a fixed key, then Base85-encoded, and the resulting data is further encrypted using AES-256 in CBC mode, requiring additional key information for complete decryption.

The obfuscated library employs XOR encryption with fixed keys to conceal the AES-256-CBC cryptographic parameters, namely the key and initialization vector (IV), which, when decrypted, are revealed as “Tk[HGC-uBbtW8@F>_dyneANrJ<x$5.K*” and “brTY4wtE_”(9hsC)U&{eF:?q>;VLz/x@”, respectively.

According to Secure List, a library decodes a Base85 string, decrypts it with AES-256-CBC using SHA-512-derived keys and IVs, decompresses the resulting data with Deflate, and finally loads the unpacked RedLine stealer using Assembly.Load(). 

Loader.hpdx.dll and loader.hz

The RedLine malware-as-a-service platform, utilizing a shared command-and-control server (213.21.220[.]222:8080), enables various threat actors to distribute and monetize the stealer, potentially through subscription-based access. 

Cybercriminals are targeting Russian-speaking entrepreneurs with a sophisticated, paid stealer implant, RedLine, to bypass software license checks and gain unauthorized access to sensitive business data. 

The use of pirated software and activators exposes organizations to data theft and cyberattacks, potentially leading to data breaches, extortion attempts, and reputational damage. 

Businesses should prioritize licensed software when it comes to protecting their sensitive information and ensuring the security of their operations.

Investigate Real-World Malicious Links,Malware & Phishing Attacks With ANY.RUN - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...