Copyright Lures Mask a Multi-Stage PureLog Stealer Attack on Key Industries
A sophisticated malware campaign delivering PureLog Stealer has been identified, targeting healthcare, government, hospitality, and education sectors in multiple countries. The attack uses localized copyright violation lures to trick victims into executing a multi-stage infection chain. The malware employs encrypted payloads, remote key retrieval, and fileless execution techniques to evade detection. It utilizes a Python-based loader and dual .NET loaders to run PureLog Stealer entirely in memory. The campaign incorporates AMSI bypass, registry persistence, screenshot capture, and victim fingerprinting for stealth and intelligence gathering. Evidence confirms communication with PureLog-associated infrastructure.
AI Analysis
Technical Summary
This threat involves a multi-stage malware campaign distributing the PureLog Stealer, a sophisticated information-stealing malware designed to target key industries such as healthcare, government, hospitality, and education. The attack begins with localized copyright violation-themed lures that trick victims into executing malicious payloads. The infection chain is complex, involving encrypted payloads and remote retrieval of keys to decrypt components, enhancing stealth. The malware employs fileless execution techniques, running entirely in memory via a Python-based loader and two .NET loaders, which helps evade traditional antivirus and endpoint detection systems. It incorporates an AMSI (Antimalware Scan Interface) bypass to avoid detection by Windows security features. Persistence is maintained through registry modifications, allowing the malware to survive reboots. The stealer captures screenshots and fingerprints the victim system to gather intelligence and tailor further attacks. Communication with command and control infrastructure associated with PureLog confirms active data exfiltration. Indicators of compromise include multiple file hashes, IP addresses, domains, and URLs used in the campaign. The campaign's use of multi-layered evasion and targeted lures indicates a high level of sophistication aimed at stealing sensitive information from critical sectors. Although no public exploits are currently known, the threat poses a significant risk due to its stealth and targeted nature.
Potential Impact
The PureLog Stealer campaign poses a substantial risk to organizations in critical sectors worldwide. Successful infections can lead to the theft of sensitive information, including credentials, personal data, and intellectual property, potentially resulting in financial loss, reputational damage, and regulatory penalties. The healthcare sector could face exposure of patient records, government entities risk leakage of confidential information, and hospitality and education sectors may suffer data breaches impacting customers and students. The fileless and in-memory execution techniques complicate detection and response, increasing the likelihood of prolonged undetected presence in networks. The campaign’s persistence mechanisms and victim fingerprinting enable attackers to maintain access and tailor attacks, potentially facilitating further lateral movement or follow-on attacks. The use of localized copyright violation lures increases the chance of successful social engineering, broadening the scope of affected victims. Overall, the campaign threatens confidentiality and integrity of data, with moderate impact on availability given the stealthy nature of the malware.
Mitigation Recommendations
Organizations should implement targeted detection and response strategies focusing on the unique characteristics of this campaign. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting fileless and in-memory execution techniques, including monitoring for AMSI bypass attempts. Monitor registry changes for suspicious persistence mechanisms. Employ network monitoring and threat intelligence feeds to detect communications with known PureLog infrastructure domains, IPs, and URLs. Conduct user awareness training emphasizing the risks of copyright violation-themed phishing lures and encourage cautious handling of unsolicited attachments or links. Implement application whitelisting to restrict execution of unauthorized Python and .NET loaders. Use multi-factor authentication to limit credential theft impact. Regularly update and patch systems to reduce attack surface. Employ sandboxing and detonation environments to analyze suspicious files and URLs. Finally, maintain comprehensive logging and conduct regular threat hunting exercises focused on indicators of compromise related to this campaign.
Affected Countries
United States, United Kingdom, Germany, Italy, France, Canada, Australia, India, Brazil, Japan
Indicators of Compromise
- hash: bed2daedb43b0e5044edbabe6d1d27e8
- hash: 551e62437edab9e496ed3339f10a15cd35e3e819
- hash: d2e8d615e7c1a810993088a8c9291e0a4a7ed4c8
- hash: d874c3654bfb4fbf0c7c069f6e5b7ebd930415d0
- hash: f4532fc1e5d53a732fcc883f7125ceb06b985048
- hash: 68c926af0d796a80fcaee24774b1ca0a2c393c3a0e30650c4d2d7965736043ca
- hash: ac591adea9a2305f9be6ae430996afd9b7432116f381b638014a0886a99c6287
- hash: e675bc054481bdca6f8cd1d561869e18712dc05a42e5c24b9add7679efc7faf6
- ip: 166.0.184.127
- ip: 64.40.154.96
- url: https://cdn.eideasrl.it/Notice%20of%20Alleged%20Violation%20of%20Intellectual%20Property%20Rights_1770380091603.zip
- url: https://quickdocshare.com/DQ
- url: https://quickdocshare.com/DQ/key
- url: https://transfer.af-k.de:443/webdownload?deliveryUuid=a43da640-777f-40c0-95de-64987150c869
- domain: quickdocshare.com
- domain: cdn.eideasrl.it
- domain: dq.bestshoppingday.com
- domain: logs.bestsaleshoppingday.com
- domain: logs.bestshopingday.com
- domain: mh.bestshopingday.com
- domain: transfer.af-k.de
- hash: fd16fecedab57b025ab53ad9ca4c882f
- hash: 35efc4b75a1d70c38513b4dfe549da417aaa476bf7e9ebd00265aaa8c7295870
- url: http://quickdocshare.com/DQ
Copyright Lures Mask a Multi-Stage PureLog Stealer Attack on Key Industries
Description
A sophisticated malware campaign delivering PureLog Stealer has been identified, targeting healthcare, government, hospitality, and education sectors in multiple countries. The attack uses localized copyright violation lures to trick victims into executing a multi-stage infection chain. The malware employs encrypted payloads, remote key retrieval, and fileless execution techniques to evade detection. It utilizes a Python-based loader and dual .NET loaders to run PureLog Stealer entirely in memory. The campaign incorporates AMSI bypass, registry persistence, screenshot capture, and victim fingerprinting for stealth and intelligence gathering. Evidence confirms communication with PureLog-associated infrastructure.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a multi-stage malware campaign distributing the PureLog Stealer, a sophisticated information-stealing malware designed to target key industries such as healthcare, government, hospitality, and education. The attack begins with localized copyright violation-themed lures that trick victims into executing malicious payloads. The infection chain is complex, involving encrypted payloads and remote retrieval of keys to decrypt components, enhancing stealth. The malware employs fileless execution techniques, running entirely in memory via a Python-based loader and two .NET loaders, which helps evade traditional antivirus and endpoint detection systems. It incorporates an AMSI (Antimalware Scan Interface) bypass to avoid detection by Windows security features. Persistence is maintained through registry modifications, allowing the malware to survive reboots. The stealer captures screenshots and fingerprints the victim system to gather intelligence and tailor further attacks. Communication with command and control infrastructure associated with PureLog confirms active data exfiltration. Indicators of compromise include multiple file hashes, IP addresses, domains, and URLs used in the campaign. The campaign's use of multi-layered evasion and targeted lures indicates a high level of sophistication aimed at stealing sensitive information from critical sectors. Although no public exploits are currently known, the threat poses a significant risk due to its stealth and targeted nature.
Potential Impact
The PureLog Stealer campaign poses a substantial risk to organizations in critical sectors worldwide. Successful infections can lead to the theft of sensitive information, including credentials, personal data, and intellectual property, potentially resulting in financial loss, reputational damage, and regulatory penalties. The healthcare sector could face exposure of patient records, government entities risk leakage of confidential information, and hospitality and education sectors may suffer data breaches impacting customers and students. The fileless and in-memory execution techniques complicate detection and response, increasing the likelihood of prolonged undetected presence in networks. The campaign’s persistence mechanisms and victim fingerprinting enable attackers to maintain access and tailor attacks, potentially facilitating further lateral movement or follow-on attacks. The use of localized copyright violation lures increases the chance of successful social engineering, broadening the scope of affected victims. Overall, the campaign threatens confidentiality and integrity of data, with moderate impact on availability given the stealthy nature of the malware.
Mitigation Recommendations
Organizations should implement targeted detection and response strategies focusing on the unique characteristics of this campaign. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting fileless and in-memory execution techniques, including monitoring for AMSI bypass attempts. Monitor registry changes for suspicious persistence mechanisms. Employ network monitoring and threat intelligence feeds to detect communications with known PureLog infrastructure domains, IPs, and URLs. Conduct user awareness training emphasizing the risks of copyright violation-themed phishing lures and encourage cautious handling of unsolicited attachments or links. Implement application whitelisting to restrict execution of unauthorized Python and .NET loaders. Use multi-factor authentication to limit credential theft impact. Regularly update and patch systems to reduce attack surface. Employ sandboxing and detonation environments to analyze suspicious files and URLs. Finally, maintain comprehensive logging and conduct regular threat hunting exercises focused on indicators of compromise related to this campaign.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.trendmicro.com/en_us/research/26/c/copyright-lures-mask-a-multistage-purelog-stealer-attack.html"]
- Adversary
- null
- Pulse Id
- 69bd01b20154ae405e9187fe
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashbed2daedb43b0e5044edbabe6d1d27e8 | — | |
hash551e62437edab9e496ed3339f10a15cd35e3e819 | — | |
hashd2e8d615e7c1a810993088a8c9291e0a4a7ed4c8 | — | |
hashd874c3654bfb4fbf0c7c069f6e5b7ebd930415d0 | — | |
hashf4532fc1e5d53a732fcc883f7125ceb06b985048 | — | |
hash68c926af0d796a80fcaee24774b1ca0a2c393c3a0e30650c4d2d7965736043ca | — | |
hashac591adea9a2305f9be6ae430996afd9b7432116f381b638014a0886a99c6287 | — | |
hashe675bc054481bdca6f8cd1d561869e18712dc05a42e5c24b9add7679efc7faf6 | — | |
hashfd16fecedab57b025ab53ad9ca4c882f | — | |
hash35efc4b75a1d70c38513b4dfe549da417aaa476bf7e9ebd00265aaa8c7295870 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip166.0.184.127 | — | |
ip64.40.154.96 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://cdn.eideasrl.it/Notice%20of%20Alleged%20Violation%20of%20Intellectual%20Property%20Rights_1770380091603.zip | — | |
urlhttps://quickdocshare.com/DQ | — | |
urlhttps://quickdocshare.com/DQ/key | — | |
urlhttps://transfer.af-k.de:443/webdownload?deliveryUuid=a43da640-777f-40c0-95de-64987150c869 | — | |
urlhttp://quickdocshare.com/DQ | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainquickdocshare.com | — | |
domaincdn.eideasrl.it | — | |
domaindq.bestshoppingday.com | — | |
domainlogs.bestsaleshoppingday.com | — | |
domainlogs.bestshopingday.com | — | |
domainmh.bestshopingday.com | — | |
domaintransfer.af-k.de | — |
Threat ID: 69bd0401e32a4fbe5f43542f
Added to database: 3/20/2026, 8:23:29 AM
Last enriched: 3/20/2026, 8:38:40 AM
Last updated: 5/2/2026, 6:32:21 AM
Views: 251
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.