In this hashtag#Splunk Threat Research Team (STRT) blog, we take a close look at a malicious campaign that used a weaponized Inno Setup installer. This malicious installer runs Pascal scripts to download and install malware on victims’ computers.
We show how the attackers use services like TinyURL and Rentry to hide their activity and avoid detection. Our analysis follows the campaign up to the point where it uses the HijackLoader, a sophisticated shellcode, to load or deliver the final payload, which in this case is the Redline Stealer.
We also share the tactics, techniques, and procedures (TTPs) we identified, along with Splunk detection ideas to help spot events related to this threat. 😊
#malwareanalysis #blueteam #reverseengineering #detectionengineering #incidentresponse