Copyright Lures Mask a Multi-Stage PureLog Stealer Attack on Key Industries
A sophisticated malware campaign delivering PureLog Stealer targets healthcare, government, hospitality, and education sectors using localized copyright violation lures. The attack employs a multi-stage infection chain with encrypted payloads, remote key retrieval, and fileless execution to evade detection. It uses a Python-based loader and dual . NET loaders to run entirely in memory, bypassing AMSI and establishing registry persistence. The malware captures screenshots and fingerprints victims for intelligence gathering. Communication with PureLog-associated infrastructure confirms active data exfiltration. The campaign leverages advanced evasion techniques making detection and mitigation challenging. Indicators include multiple hashes, IPs, domains, and URLs linked to the attack infrastructure. No known exploits in the wild have been reported yet. Organizations in multiple countries, especially those in targeted sectors, should be vigilant and implement targeted defenses.
AI Analysis
Technical Summary
This threat involves a multi-stage malware campaign distributing the PureLog Stealer, a sophisticated information-stealing malware designed to target key industries such as healthcare, government, hospitality, and education. The attack begins with localized copyright violation-themed lures that trick victims into executing malicious payloads. The infection chain is complex, involving encrypted payloads and remote retrieval of keys to decrypt components, enhancing stealth. The malware employs fileless execution techniques, running entirely in memory via a Python-based loader and two .NET loaders, which helps evade traditional antivirus and endpoint detection systems. It incorporates an AMSI (Antimalware Scan Interface) bypass to avoid detection by Windows security features. Persistence is maintained through registry modifications, allowing the malware to survive reboots. The stealer captures screenshots and fingerprints the victim system to gather intelligence and tailor further attacks. Communication with command and control infrastructure associated with PureLog confirms active data exfiltration. Indicators of compromise include multiple file hashes, IP addresses, domains, and URLs used in the campaign. The campaign's use of multi-layered evasion and targeted lures indicates a high level of sophistication aimed at stealing sensitive information from critical sectors. Although no public exploits are currently known, the threat poses a significant risk due to its stealth and targeted nature.
Potential Impact
The PureLog Stealer campaign poses a substantial risk to organizations in critical sectors worldwide. Successful infections can lead to the theft of sensitive information, including credentials, personal data, and intellectual property, potentially resulting in financial loss, reputational damage, and regulatory penalties. The healthcare sector could face exposure of patient records, government entities risk leakage of confidential information, and hospitality and education sectors may suffer data breaches impacting customers and students. The fileless and in-memory execution techniques complicate detection and response, increasing the likelihood of prolonged undetected presence in networks. The campaign’s persistence mechanisms and victim fingerprinting enable attackers to maintain access and tailor attacks, potentially facilitating further lateral movement or follow-on attacks. The use of localized copyright violation lures increases the chance of successful social engineering, broadening the scope of affected victims. Overall, the campaign threatens confidentiality and integrity of data, with moderate impact on availability given the stealthy nature of the malware.
Mitigation Recommendations
Organizations should implement targeted detection and response strategies focusing on the unique characteristics of this campaign. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting fileless and in-memory execution techniques, including monitoring for AMSI bypass attempts. Monitor registry changes for suspicious persistence mechanisms. Employ network monitoring and threat intelligence feeds to detect communications with known PureLog infrastructure domains, IPs, and URLs. Conduct user awareness training emphasizing the risks of copyright violation-themed phishing lures and encourage cautious handling of unsolicited attachments or links. Implement application whitelisting to restrict execution of unauthorized Python and .NET loaders. Use multi-factor authentication to limit credential theft impact. Regularly update and patch systems to reduce attack surface. Employ sandboxing and detonation environments to analyze suspicious files and URLs. Finally, maintain comprehensive logging and conduct regular threat hunting exercises focused on indicators of compromise related to this campaign.
Affected Countries
United States, United Kingdom, Germany, Italy, France, Canada, Australia, India, Brazil, Japan
Indicators of Compromise
- hash: bed2daedb43b0e5044edbabe6d1d27e8
- hash: 551e62437edab9e496ed3339f10a15cd35e3e819
- hash: d2e8d615e7c1a810993088a8c9291e0a4a7ed4c8
- hash: d874c3654bfb4fbf0c7c069f6e5b7ebd930415d0
- hash: f4532fc1e5d53a732fcc883f7125ceb06b985048
- hash: 68c926af0d796a80fcaee24774b1ca0a2c393c3a0e30650c4d2d7965736043ca
- hash: ac591adea9a2305f9be6ae430996afd9b7432116f381b638014a0886a99c6287
- hash: e675bc054481bdca6f8cd1d561869e18712dc05a42e5c24b9add7679efc7faf6
- ip: 166.0.184.127
- ip: 64.40.154.96
- url: https://cdn.eideasrl.it/Notice%20of%20Alleged%20Violation%20of%20Intellectual%20Property%20Rights_1770380091603.zip
- url: https://quickdocshare.com/DQ
- url: https://quickdocshare.com/DQ/key
- url: https://transfer.af-k.de:443/webdownload?deliveryUuid=a43da640-777f-40c0-95de-64987150c869
- domain: quickdocshare.com
- domain: cdn.eideasrl.it
- domain: dq.bestshoppingday.com
- domain: logs.bestsaleshoppingday.com
- domain: logs.bestshopingday.com
- domain: mh.bestshopingday.com
- domain: transfer.af-k.de
- hash: fd16fecedab57b025ab53ad9ca4c882f
- hash: 35efc4b75a1d70c38513b4dfe549da417aaa476bf7e9ebd00265aaa8c7295870
- url: http://quickdocshare.com/DQ
Copyright Lures Mask a Multi-Stage PureLog Stealer Attack on Key Industries
Description
A sophisticated malware campaign delivering PureLog Stealer targets healthcare, government, hospitality, and education sectors using localized copyright violation lures. The attack employs a multi-stage infection chain with encrypted payloads, remote key retrieval, and fileless execution to evade detection. It uses a Python-based loader and dual . NET loaders to run entirely in memory, bypassing AMSI and establishing registry persistence. The malware captures screenshots and fingerprints victims for intelligence gathering. Communication with PureLog-associated infrastructure confirms active data exfiltration. The campaign leverages advanced evasion techniques making detection and mitigation challenging. Indicators include multiple hashes, IPs, domains, and URLs linked to the attack infrastructure. No known exploits in the wild have been reported yet. Organizations in multiple countries, especially those in targeted sectors, should be vigilant and implement targeted defenses.
AI-Powered Analysis
Technical Analysis
This threat involves a multi-stage malware campaign distributing the PureLog Stealer, a sophisticated information-stealing malware designed to target key industries such as healthcare, government, hospitality, and education. The attack begins with localized copyright violation-themed lures that trick victims into executing malicious payloads. The infection chain is complex, involving encrypted payloads and remote retrieval of keys to decrypt components, enhancing stealth. The malware employs fileless execution techniques, running entirely in memory via a Python-based loader and two .NET loaders, which helps evade traditional antivirus and endpoint detection systems. It incorporates an AMSI (Antimalware Scan Interface) bypass to avoid detection by Windows security features. Persistence is maintained through registry modifications, allowing the malware to survive reboots. The stealer captures screenshots and fingerprints the victim system to gather intelligence and tailor further attacks. Communication with command and control infrastructure associated with PureLog confirms active data exfiltration. Indicators of compromise include multiple file hashes, IP addresses, domains, and URLs used in the campaign. The campaign's use of multi-layered evasion and targeted lures indicates a high level of sophistication aimed at stealing sensitive information from critical sectors. Although no public exploits are currently known, the threat poses a significant risk due to its stealth and targeted nature.
Potential Impact
The PureLog Stealer campaign poses a substantial risk to organizations in critical sectors worldwide. Successful infections can lead to the theft of sensitive information, including credentials, personal data, and intellectual property, potentially resulting in financial loss, reputational damage, and regulatory penalties. The healthcare sector could face exposure of patient records, government entities risk leakage of confidential information, and hospitality and education sectors may suffer data breaches impacting customers and students. The fileless and in-memory execution techniques complicate detection and response, increasing the likelihood of prolonged undetected presence in networks. The campaign’s persistence mechanisms and victim fingerprinting enable attackers to maintain access and tailor attacks, potentially facilitating further lateral movement or follow-on attacks. The use of localized copyright violation lures increases the chance of successful social engineering, broadening the scope of affected victims. Overall, the campaign threatens confidentiality and integrity of data, with moderate impact on availability given the stealthy nature of the malware.
Mitigation Recommendations
Organizations should implement targeted detection and response strategies focusing on the unique characteristics of this campaign. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting fileless and in-memory execution techniques, including monitoring for AMSI bypass attempts. Monitor registry changes for suspicious persistence mechanisms. Employ network monitoring and threat intelligence feeds to detect communications with known PureLog infrastructure domains, IPs, and URLs. Conduct user awareness training emphasizing the risks of copyright violation-themed phishing lures and encourage cautious handling of unsolicited attachments or links. Implement application whitelisting to restrict execution of unauthorized Python and .NET loaders. Use multi-factor authentication to limit credential theft impact. Regularly update and patch systems to reduce attack surface. Employ sandboxing and detonation environments to analyze suspicious files and URLs. Finally, maintain comprehensive logging and conduct regular threat hunting exercises focused on indicators of compromise related to this campaign.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.trendmicro.com/en_us/research/26/c/copyright-lures-mask-a-multistage-purelog-stealer-attack.html"]
- Adversary
- null
- Pulse Id
- 69bd01b20154ae405e9187fe
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashbed2daedb43b0e5044edbabe6d1d27e8 | — | |
hash551e62437edab9e496ed3339f10a15cd35e3e819 | — | |
hashd2e8d615e7c1a810993088a8c9291e0a4a7ed4c8 | — | |
hashd874c3654bfb4fbf0c7c069f6e5b7ebd930415d0 | — | |
hashf4532fc1e5d53a732fcc883f7125ceb06b985048 | — | |
hash68c926af0d796a80fcaee24774b1ca0a2c393c3a0e30650c4d2d7965736043ca | — | |
hashac591adea9a2305f9be6ae430996afd9b7432116f381b638014a0886a99c6287 | — | |
hashe675bc054481bdca6f8cd1d561869e18712dc05a42e5c24b9add7679efc7faf6 | — | |
hashfd16fecedab57b025ab53ad9ca4c882f | — | |
hash35efc4b75a1d70c38513b4dfe549da417aaa476bf7e9ebd00265aaa8c7295870 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip166.0.184.127 | — | |
ip64.40.154.96 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://cdn.eideasrl.it/Notice%20of%20Alleged%20Violation%20of%20Intellectual%20Property%20Rights_1770380091603.zip | — | |
urlhttps://quickdocshare.com/DQ | — | |
urlhttps://quickdocshare.com/DQ/key | — | |
urlhttps://transfer.af-k.de:443/webdownload?deliveryUuid=a43da640-777f-40c0-95de-64987150c869 | — | |
urlhttp://quickdocshare.com/DQ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainquickdocshare.com | — | |
domaincdn.eideasrl.it | — | |
domaindq.bestshoppingday.com | — | |
domainlogs.bestsaleshoppingday.com | — | |
domainlogs.bestshopingday.com | — | |
domainmh.bestshopingday.com | — | |
domaintransfer.af-k.de | — |
Threat ID: 69bd0401e32a4fbe5f43542f
Added to database: 3/20/2026, 8:23:29 AM
Last enriched: 3/20/2026, 8:38:40 AM
Last updated: 3/20/2026, 3:00:30 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.