Unit 42’s Insight: The Sophisticated Evasion Tactics of GuLoader and RedLine Stealer

RedLine Stealer
Screenshot taken from dnSpy that contains the RedLine Stealer sample’s encrypted configuration block | Image: Unit 42