A Vietnamese threat actor's shift from PXA Stealer to PureRAT
A Vietnamese threat actor has transitioned from using the PXA Stealer to deploying PureRAT, a commercial remote access trojan. The attack chain involves multiple stages, including phishing emails, Python-based infostealers, and .NET loaders. The campaign demonstrates a progression in complexity, utilizing DLL sideloading, obfuscation techniques, and defense evasion methods. The final payload, PureRAT, provides the attacker with extensive control over compromised systems. The threat actor's shift to commodity malware indicates a maturing operation, lowering the barrier for sophisticated attacks. This evolution highlights the need for robust, multi-layered defense strategies to counter such adaptable threats.
AI Analysis
Technical Summary
This threat involves a Vietnamese cybercriminal group previously known for deploying PXA Stealer, now transitioning to using PureRAT, a commercially available remote access trojan. The attack chain is sophisticated and multi-phased: it begins with phishing emails (MITRE ATT&CK T1566.001) that deliver Python-based infostealers and .NET loaders. The loaders utilize DLL sideloading (T1574.001) to evade detection by loading malicious DLLs under the guise of legitimate software components. Obfuscation techniques (T1027) and defense evasion methods such as disabling security tools (T1562.001, T1562.006) and process injection (T1055.012) are employed to maintain stealth. The final payload, PureRAT, provides the attacker with extensive remote control capabilities, including credential theft, keylogging, file manipulation, and command execution. The use of commodity malware like PureRAT indicates a lowering of technical barriers, allowing the threat actor to scale operations and potentially increase attack frequency. Indicators include IP 157.66.26.209 and multiple file hashes linked to the malware components. The campaign demonstrates a maturation in tactics, techniques, and procedures (TTPs), emphasizing the need for layered defenses and continuous monitoring. No known exploits in the wild are reported, but the threat actor’s evolving sophistication poses a credible risk to targeted organizations.
Potential Impact
For European organizations, the deployment of PureRAT via phishing and multi-stage infection chains can lead to significant confidentiality breaches through data theft and espionage. The RAT’s extensive control capabilities enable attackers to manipulate system integrity and potentially disrupt availability through lateral movement or destruction of data. Sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable due to the value of their data and the potential for operational disruption. The use of DLL sideloading and obfuscation complicates detection, increasing dwell time and the risk of prolonged compromise. The shift to commodity malware lowers the skill threshold, potentially increasing the volume and diversity of attacks targeting European entities. This could result in financial losses, reputational damage, regulatory penalties under GDPR, and national security concerns. The medium severity reflects the balance between the complexity of the attack chain and the requirement for user interaction (phishing) to initiate the infection.
Mitigation Recommendations
1. Implement advanced phishing defenses including user training, email filtering, and sandboxing to detect and block malicious attachments and links. 2. Deploy endpoint detection and response (EDR) solutions capable of identifying DLL sideloading and process injection behaviors. 3. Monitor for unusual network traffic patterns, especially connections to known malicious IPs such as 157.66.26.209. 4. Enforce application whitelisting and restrict execution of unauthorized scripts and binaries, particularly Python and .NET loaders. 5. Regularly update and patch all software to reduce attack surface, even though no specific CVEs are noted, to mitigate exploitation of potential vulnerabilities. 6. Utilize threat intelligence feeds to update detection rules with the provided file hashes and indicators of compromise. 7. Implement multi-factor authentication to limit attacker lateral movement post-compromise. 8. Conduct regular incident response exercises to prepare for detection and containment of RAT infections. 9. Employ network segmentation to limit the spread of malware within organizational networks. 10. Review and harden security controls around DLL loading paths to prevent sideloading attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- ip: 157.66.26.209
- hash: 06fc70aa08756a752546198ceb9770068a2776c5b898e5ff24af9ed4a823fd9d
- hash: f5e9e24886ec4c60f45690a0e34bae71d8a38d1c35eb04d02148cdb650dd2601
- hash: f6ed084aaa8ecf1b1e20dfa859e8f34c4c18b7ad7ac14dc189bc1fc4be1bd709
A Vietnamese threat actor's shift from PXA Stealer to PureRAT
Description
A Vietnamese threat actor has transitioned from using the PXA Stealer to deploying PureRAT, a commercial remote access trojan. The attack chain involves multiple stages, including phishing emails, Python-based infostealers, and .NET loaders. The campaign demonstrates a progression in complexity, utilizing DLL sideloading, obfuscation techniques, and defense evasion methods. The final payload, PureRAT, provides the attacker with extensive control over compromised systems. The threat actor's shift to commodity malware indicates a maturing operation, lowering the barrier for sophisticated attacks. This evolution highlights the need for robust, multi-layered defense strategies to counter such adaptable threats.
AI-Powered Analysis
Technical Analysis
This threat involves a Vietnamese cybercriminal group previously known for deploying PXA Stealer, now transitioning to using PureRAT, a commercially available remote access trojan. The attack chain is sophisticated and multi-phased: it begins with phishing emails (MITRE ATT&CK T1566.001) that deliver Python-based infostealers and .NET loaders. The loaders utilize DLL sideloading (T1574.001) to evade detection by loading malicious DLLs under the guise of legitimate software components. Obfuscation techniques (T1027) and defense evasion methods such as disabling security tools (T1562.001, T1562.006) and process injection (T1055.012) are employed to maintain stealth. The final payload, PureRAT, provides the attacker with extensive remote control capabilities, including credential theft, keylogging, file manipulation, and command execution. The use of commodity malware like PureRAT indicates a lowering of technical barriers, allowing the threat actor to scale operations and potentially increase attack frequency. Indicators include IP 157.66.26.209 and multiple file hashes linked to the malware components. The campaign demonstrates a maturation in tactics, techniques, and procedures (TTPs), emphasizing the need for layered defenses and continuous monitoring. No known exploits in the wild are reported, but the threat actor’s evolving sophistication poses a credible risk to targeted organizations.
Potential Impact
For European organizations, the deployment of PureRAT via phishing and multi-stage infection chains can lead to significant confidentiality breaches through data theft and espionage. The RAT’s extensive control capabilities enable attackers to manipulate system integrity and potentially disrupt availability through lateral movement or destruction of data. Sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable due to the value of their data and the potential for operational disruption. The use of DLL sideloading and obfuscation complicates detection, increasing dwell time and the risk of prolonged compromise. The shift to commodity malware lowers the skill threshold, potentially increasing the volume and diversity of attacks targeting European entities. This could result in financial losses, reputational damage, regulatory penalties under GDPR, and national security concerns. The medium severity reflects the balance between the complexity of the attack chain and the requirement for user interaction (phishing) to initiate the infection.
Mitigation Recommendations
1. Implement advanced phishing defenses including user training, email filtering, and sandboxing to detect and block malicious attachments and links. 2. Deploy endpoint detection and response (EDR) solutions capable of identifying DLL sideloading and process injection behaviors. 3. Monitor for unusual network traffic patterns, especially connections to known malicious IPs such as 157.66.26.209. 4. Enforce application whitelisting and restrict execution of unauthorized scripts and binaries, particularly Python and .NET loaders. 5. Regularly update and patch all software to reduce attack surface, even though no specific CVEs are noted, to mitigate exploitation of potential vulnerabilities. 6. Utilize threat intelligence feeds to update detection rules with the provided file hashes and indicators of compromise. 7. Implement multi-factor authentication to limit attacker lateral movement post-compromise. 8. Conduct regular incident response exercises to prepare for detection and containment of RAT infections. 9. Employ network segmentation to limit the spread of malware within organizational networks. 10. Review and harden security controls around DLL loading paths to prevent sideloading attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.huntress.com/blog/purerat-threat-actor-evolution"]
- Adversary
- PXA Stealer group
- Pulse Id
- 68e8c2e51d4e583ce113cce3
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip157.66.26.209 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash06fc70aa08756a752546198ceb9770068a2776c5b898e5ff24af9ed4a823fd9d | — | |
hashf5e9e24886ec4c60f45690a0e34bae71d8a38d1c35eb04d02148cdb650dd2601 | — | |
hashf6ed084aaa8ecf1b1e20dfa859e8f34c4c18b7ad7ac14dc189bc1fc4be1bd709 | — |
Threat ID: 68e8c5819fd71783de4a68f5
Added to database: 10/10/2025, 8:36:17 AM
Last enriched: 10/10/2025, 8:51:02 AM
Last updated: 11/23/2025, 7:09:09 AM
Views: 89
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-11-22
MediumThreatFox IOCs for 2025-11-21
MediumAPT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
MediumSyncro + Lovable: RAT delivery via AI-generated websites | Kaspersky official blog
MediumNew Sturnus Android Malware Reads WhatsApp, Telegram, Signal Chats via Accessibility Abuse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.