Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

A Vietnamese threat actor's shift from PXA Stealer to PureRAT

0
Medium
Published: Fri Oct 10 2025 (10/10/2025, 08:25:09 UTC)
Source: AlienVault OTX General

Description

A Vietnamese threat actor has transitioned from using the PXA Stealer to deploying PureRAT, a commercial remote access trojan. The attack chain involves multiple stages, including phishing emails, Python-based infostealers, and .NET loaders. The campaign demonstrates a progression in complexity, utilizing DLL sideloading, obfuscation techniques, and defense evasion methods. The final payload, PureRAT, provides the attacker with extensive control over compromised systems. The threat actor's shift to commodity malware indicates a maturing operation, lowering the barrier for sophisticated attacks. This evolution highlights the need for robust, multi-layered defense strategies to counter such adaptable threats.

AI-Powered Analysis

AILast updated: 10/10/2025, 08:51:02 UTC

Technical Analysis

This threat involves a Vietnamese cybercriminal group previously known for deploying PXA Stealer, now transitioning to using PureRAT, a commercially available remote access trojan. The attack chain is sophisticated and multi-phased: it begins with phishing emails (MITRE ATT&CK T1566.001) that deliver Python-based infostealers and .NET loaders. The loaders utilize DLL sideloading (T1574.001) to evade detection by loading malicious DLLs under the guise of legitimate software components. Obfuscation techniques (T1027) and defense evasion methods such as disabling security tools (T1562.001, T1562.006) and process injection (T1055.012) are employed to maintain stealth. The final payload, PureRAT, provides the attacker with extensive remote control capabilities, including credential theft, keylogging, file manipulation, and command execution. The use of commodity malware like PureRAT indicates a lowering of technical barriers, allowing the threat actor to scale operations and potentially increase attack frequency. Indicators include IP 157.66.26.209 and multiple file hashes linked to the malware components. The campaign demonstrates a maturation in tactics, techniques, and procedures (TTPs), emphasizing the need for layered defenses and continuous monitoring. No known exploits in the wild are reported, but the threat actor’s evolving sophistication poses a credible risk to targeted organizations.

Potential Impact

For European organizations, the deployment of PureRAT via phishing and multi-stage infection chains can lead to significant confidentiality breaches through data theft and espionage. The RAT’s extensive control capabilities enable attackers to manipulate system integrity and potentially disrupt availability through lateral movement or destruction of data. Sectors such as finance, government, healthcare, and critical infrastructure are particularly vulnerable due to the value of their data and the potential for operational disruption. The use of DLL sideloading and obfuscation complicates detection, increasing dwell time and the risk of prolonged compromise. The shift to commodity malware lowers the skill threshold, potentially increasing the volume and diversity of attacks targeting European entities. This could result in financial losses, reputational damage, regulatory penalties under GDPR, and national security concerns. The medium severity reflects the balance between the complexity of the attack chain and the requirement for user interaction (phishing) to initiate the infection.

Mitigation Recommendations

1. Implement advanced phishing defenses including user training, email filtering, and sandboxing to detect and block malicious attachments and links. 2. Deploy endpoint detection and response (EDR) solutions capable of identifying DLL sideloading and process injection behaviors. 3. Monitor for unusual network traffic patterns, especially connections to known malicious IPs such as 157.66.26.209. 4. Enforce application whitelisting and restrict execution of unauthorized scripts and binaries, particularly Python and .NET loaders. 5. Regularly update and patch all software to reduce attack surface, even though no specific CVEs are noted, to mitigate exploitation of potential vulnerabilities. 6. Utilize threat intelligence feeds to update detection rules with the provided file hashes and indicators of compromise. 7. Implement multi-factor authentication to limit attacker lateral movement post-compromise. 8. Conduct regular incident response exercises to prepare for detection and containment of RAT infections. 9. Employ network segmentation to limit the spread of malware within organizational networks. 10. Review and harden security controls around DLL loading paths to prevent sideloading attacks.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.huntress.com/blog/purerat-threat-actor-evolution"]
Adversary
PXA Stealer group
Pulse Id
68e8c2e51d4e583ce113cce3
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip157.66.26.209

Hash

ValueDescriptionCopy
hash06fc70aa08756a752546198ceb9770068a2776c5b898e5ff24af9ed4a823fd9d
hashf5e9e24886ec4c60f45690a0e34bae71d8a38d1c35eb04d02148cdb650dd2601
hashf6ed084aaa8ecf1b1e20dfa859e8f34c4c18b7ad7ac14dc189bc1fc4be1bd709

Threat ID: 68e8c5819fd71783de4a68f5

Added to database: 10/10/2025, 8:36:17 AM

Last enriched: 10/10/2025, 8:51:02 AM

Last updated: 11/23/2025, 7:09:09 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats