Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Copyright Lures Mask a Multi-Stage PureLog Stealer Attack on Key Industries

0
Medium
Published: Fri Mar 20 2026 (03/20/2026, 08:13:38 UTC)
Source: AlienVault OTX General

Description

A sophisticated malware campaign delivering PureLog Stealer targets healthcare, government, hospitality, and education sectors using localized copyright violation lures. The attack employs a multi-stage infection chain with encrypted payloads, remote key retrieval, and fileless execution to evade detection. It uses a Python-based loader and dual . NET loaders to run entirely in memory, bypassing AMSI and establishing registry persistence. The malware captures screenshots and fingerprints victims for intelligence gathering. Communication with PureLog-associated infrastructure confirms active data exfiltration. The campaign leverages advanced evasion techniques making detection and mitigation challenging. Indicators include multiple hashes, IPs, domains, and URLs linked to the attack infrastructure. No known exploits in the wild have been reported yet. Organizations in multiple countries, especially those in targeted sectors, should be vigilant and implement targeted defenses.

AI-Powered Analysis

AILast updated: 03/20/2026, 08:38:40 UTC

Technical Analysis

This threat involves a multi-stage malware campaign distributing the PureLog Stealer, a sophisticated information-stealing malware designed to target key industries such as healthcare, government, hospitality, and education. The attack begins with localized copyright violation-themed lures that trick victims into executing malicious payloads. The infection chain is complex, involving encrypted payloads and remote retrieval of keys to decrypt components, enhancing stealth. The malware employs fileless execution techniques, running entirely in memory via a Python-based loader and two .NET loaders, which helps evade traditional antivirus and endpoint detection systems. It incorporates an AMSI (Antimalware Scan Interface) bypass to avoid detection by Windows security features. Persistence is maintained through registry modifications, allowing the malware to survive reboots. The stealer captures screenshots and fingerprints the victim system to gather intelligence and tailor further attacks. Communication with command and control infrastructure associated with PureLog confirms active data exfiltration. Indicators of compromise include multiple file hashes, IP addresses, domains, and URLs used in the campaign. The campaign's use of multi-layered evasion and targeted lures indicates a high level of sophistication aimed at stealing sensitive information from critical sectors. Although no public exploits are currently known, the threat poses a significant risk due to its stealth and targeted nature.

Potential Impact

The PureLog Stealer campaign poses a substantial risk to organizations in critical sectors worldwide. Successful infections can lead to the theft of sensitive information, including credentials, personal data, and intellectual property, potentially resulting in financial loss, reputational damage, and regulatory penalties. The healthcare sector could face exposure of patient records, government entities risk leakage of confidential information, and hospitality and education sectors may suffer data breaches impacting customers and students. The fileless and in-memory execution techniques complicate detection and response, increasing the likelihood of prolonged undetected presence in networks. The campaign’s persistence mechanisms and victim fingerprinting enable attackers to maintain access and tailor attacks, potentially facilitating further lateral movement or follow-on attacks. The use of localized copyright violation lures increases the chance of successful social engineering, broadening the scope of affected victims. Overall, the campaign threatens confidentiality and integrity of data, with moderate impact on availability given the stealthy nature of the malware.

Mitigation Recommendations

Organizations should implement targeted detection and response strategies focusing on the unique characteristics of this campaign. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting fileless and in-memory execution techniques, including monitoring for AMSI bypass attempts. Monitor registry changes for suspicious persistence mechanisms. Employ network monitoring and threat intelligence feeds to detect communications with known PureLog infrastructure domains, IPs, and URLs. Conduct user awareness training emphasizing the risks of copyright violation-themed phishing lures and encourage cautious handling of unsolicited attachments or links. Implement application whitelisting to restrict execution of unauthorized Python and .NET loaders. Use multi-factor authentication to limit credential theft impact. Regularly update and patch systems to reduce attack surface. Employ sandboxing and detonation environments to analyze suspicious files and URLs. Finally, maintain comprehensive logging and conduct regular threat hunting exercises focused on indicators of compromise related to this campaign.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_us/research/26/c/copyright-lures-mask-a-multistage-purelog-stealer-attack.html"]
Adversary
null
Pulse Id
69bd01b20154ae405e9187fe
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashbed2daedb43b0e5044edbabe6d1d27e8
hash551e62437edab9e496ed3339f10a15cd35e3e819
hashd2e8d615e7c1a810993088a8c9291e0a4a7ed4c8
hashd874c3654bfb4fbf0c7c069f6e5b7ebd930415d0
hashf4532fc1e5d53a732fcc883f7125ceb06b985048
hash68c926af0d796a80fcaee24774b1ca0a2c393c3a0e30650c4d2d7965736043ca
hashac591adea9a2305f9be6ae430996afd9b7432116f381b638014a0886a99c6287
hashe675bc054481bdca6f8cd1d561869e18712dc05a42e5c24b9add7679efc7faf6
hashfd16fecedab57b025ab53ad9ca4c882f
hash35efc4b75a1d70c38513b4dfe549da417aaa476bf7e9ebd00265aaa8c7295870

Ip

ValueDescriptionCopy
ip166.0.184.127
ip64.40.154.96

Url

ValueDescriptionCopy
urlhttps://cdn.eideasrl.it/Notice%20of%20Alleged%20Violation%20of%20Intellectual%20Property%20Rights_1770380091603.zip
urlhttps://quickdocshare.com/DQ
urlhttps://quickdocshare.com/DQ/key
urlhttps://transfer.af-k.de:443/webdownload?deliveryUuid=a43da640-777f-40c0-95de-64987150c869
urlhttp://quickdocshare.com/DQ

Domain

ValueDescriptionCopy
domainquickdocshare.com
domaincdn.eideasrl.it
domaindq.bestshoppingday.com
domainlogs.bestsaleshoppingday.com
domainlogs.bestshopingday.com
domainmh.bestshopingday.com
domaintransfer.af-k.de

Threat ID: 69bd0401e32a4fbe5f43542f

Added to database: 3/20/2026, 8:23:29 AM

Last enriched: 3/20/2026, 8:38:40 AM

Last updated: 3/20/2026, 3:00:30 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses