Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

LATAM baited into the delivery of PureHVNC

0
Medium
Published: Fri Oct 31 2025 (10/31/2025, 09:32:15 UTC)
Source: AlienVault OTX General

Description

Between August and October 2025, a phishing campaign targeted Colombian users by impersonating the Attorney General's office to deliver the PureHVNC Remote Access Trojan (RAT) via the Hijackloader malware loader. The attack chain involved sophisticated techniques such as DLL side-loading, anti-virtual machine checks, and multiple code injection methods to evade detection and maintain persistence. This campaign marks the first known use of Hijackloader to deliver PureHVNC in Spanish-speaking Latin America, signaling an evolution in regional threat actor tactics. Although primarily focused on Colombia, the use of phishing and advanced evasion techniques poses a risk to organizations with similar user profiles or language contexts. The campaign's medium severity reflects the complexity and potential for unauthorized remote access but lacks evidence of widespread exploitation beyond the initial targets. Defenders should prioritize user awareness, advanced endpoint detection, and monitoring for indicators of DLL side-loading and unusual process injections. No CVSS score is available; based on impact and exploitation complexity, the threat is assessed as medium severity.

AI-Powered Analysis

AILast updated: 10/31/2025, 11:25:21 UTC

Technical Analysis

This threat involves a targeted phishing campaign conducted between August and October 2025 against Colombian users. Attackers impersonated the Attorney General's office to lure victims into downloading a malicious file. The infection chain begins with the Hijackloader malware loader, which is used to deliver the PureHVNC Remote Access Trojan (RAT). PureHVNC is a remote access tool that allows attackers to gain persistent, unauthorized access to infected systems. The campaign employs advanced evasion and persistence techniques, including DLL side-loading—a method where a legitimate application loads a malicious DLL to evade detection—and anti-virtual machine (anti-VM) checks to avoid analysis in sandbox environments. Additionally, various code injection methods are used to hide malicious activity within legitimate processes, complicating detection efforts. This campaign is notable as the first observed instance of Hijackloader delivering PureHVNC to Spanish-speaking users in Latin America, indicating a shift in regional threat actor tactics and toolsets. The campaign leverages multiple MITRE ATT&CK techniques such as T1053.005 (Scheduled Task/Job), T1218.011 (Signed Binary Proxy Execution), T1204.002 (User Execution: Malicious File), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), T1497 (Virtualization/Sandbox Evasion), T1059.001 (Command and Scripting Interpreter: PowerShell), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder), T1566 (Phishing), T1027 (Obfuscated Files or Information), T1071.001 (Application Layer Protocol: Web Protocols), and T1574.002 (Hijack Execution Flow: DLL Side-Loading). No known exploits in the wild beyond this campaign have been reported, and no specific affected software versions are identified.

Potential Impact

For European organizations, the direct impact of this campaign is currently limited due to its targeting of Colombian users and Spanish-speaking Latin America. However, the techniques and malware used—Hijackloader and PureHVNC RAT—are globally relevant and could be adapted or expanded to target European entities, especially those with business or personnel links to Latin America or Spanish-speaking communities. The PureHVNC RAT enables attackers to gain persistent remote access, potentially leading to data exfiltration, espionage, credential theft, lateral movement, and disruption of operations. The use of sophisticated evasion techniques increases the likelihood of prolonged undetected presence, raising the risk of significant damage. Organizations in Europe with remote workforces, international collaborations, or exposure to phishing risks could face similar threats if attackers pivot their campaigns. The medium severity reflects a moderate but credible risk to confidentiality, integrity, and availability, particularly if the malware is deployed in critical infrastructure or sensitive environments.

Mitigation Recommendations

European organizations should implement targeted phishing awareness training emphasizing the risks of impersonation attacks and suspicious links, especially those purporting to come from official government entities. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying DLL side-loading, process injection, and anti-VM evasion techniques. Monitor for unusual scheduled tasks, registry run keys, and startup folder modifications indicative of persistence mechanisms. Employ network traffic analysis to detect anomalous outbound connections consistent with RAT command and control communications. Enforce strict application whitelisting and code-signing policies to prevent unauthorized DLL loading. Regularly update and patch systems to reduce the attack surface, even though no specific vulnerable software versions are identified. Conduct threat hunting exercises focusing on MITRE ATT&CK techniques observed in this campaign. Finally, maintain incident response readiness to quickly isolate and remediate infected hosts.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.ibm.com/think/x-force/latam-baited-into-delivery-of-purehvnc"]
Adversary
null
Pulse Id
6904821fa7d50264deb316a4
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domain7octubredc.duckdns.org
domaindckis13.duckdns.org
domaindckis7.duckdns.org
domainenviopago.mysynology.net
domainmaximo26.duckdns.org
domainnuevos777.duckdns.org
domainsofiavergara.duckdns.org

Hash

ValueDescriptionCopy
hash0ea1ecf1f75e4423b86c00842dfdf39d
MD5 of 85641c8fb94e8e4c5202152dcbb2bb26646529290d984988ecb72e18d63c9bc5
hash4b917db1f7ddc803821b573f1bc2a91c
MD5 of 33d0c63777882c9ec514be062612a56fdb1f291fcb6676c49480d3cd4501c508
hash5a916ebd868642889f99e654c10892ad
MD5 of afecefa6d9bd1e6d1c92144209eda320e1fe0f196ffa8e8bc114e7d3a25503f6
hash1d5a6f9661525df3eba7c0924bc6ef2922155691
SHA1 of 85641c8fb94e8e4c5202152dcbb2bb26646529290d984988ecb72e18d63c9bc5
hashb60d10aa993afd8001b476f2f92588839f387eab
SHA1 of 33d0c63777882c9ec514be062612a56fdb1f291fcb6676c49480d3cd4501c508
hashdb97860b9c680d3519837fcfd8f4172a8cfdb1fd
SHA1 of afecefa6d9bd1e6d1c92144209eda320e1fe0f196ffa8e8bc114e7d3a25503f6
hash0113d9f3d93069a29458b3b4c33610aae03961014df60a9e859f3104086d886a
hash14becb3a9663128543e1868d09611bd30a2b64c655dfb407a727a7f2d0fb8b7e
hash1ae61edf35127264d329b7c0e2bddb7077e34cc5f9417de86ab6d2d65bad4b4f
hash1bf3a1cf9bc7eded0b8994d44cf2b801bf12bc72dc23fb337ddd3a64ac235782
hash22d474e729d600dcd84ce139f6208ce3e3390693afa7b52b0615174fca6d0fe2
hash2cbfc482e27a2240a48d2fb6f6f740ff0f08598f83ae643a507c6f12a865dc28
hash2ec31a8a36d73fa8354a7ac0c39506dbe12638a0dc1b900f57620b8d53ae987f
hash33d0c63777882c9ec514be062612a56fdb1f291fcb6676c49480d3cd4501c508
hash4484b0ac51536890301a0e6573b962e069e31abc4c0c6f0f6fc1bf66bf588a93
hash47245b7d2d8cb6b92308deb80399e0273193d5bca39da85a6b2a87a109d18d85
hash57c49cff3e71bc75641c78a5a72d8509007a18032510f607c042053c9d280511
hash6d93a486e077858b75eb814e9a7bda181189d5833adce7cec75775cfda03f514
hash768ca38878c5bb15650343ce49292315a9834eaf62fad14422d52510c3787228
hash776bbaa44c7788e0ccd5945d583de9473b6246c44906692cb0a52e6329cb213a
hash7c3d9ad3f1bd890e3552dc67093e161395d4e1fab79ec745220af1e19a279722
hash7e64102405459192813541448c8fbadc481997a2065f26c848f1e3594ca404c9
hash85641c8fb94e8e4c5202152dcbb2bb26646529290d984988ecb72e18d63c9bc5
hash96ee786c5b6167c0f0f770efbace25e97d61e127ef7f58a879b6cf4b57e202c3
hash977f2f18ff13c93406c5702f83c04a9412760e02028aefc7c1cb7d6f2797a9b5
hash9e9997b54da0c633ffcf0a4fb94e67b482cf7a89522d1b254778d0c6c22c70ee
hasha0e4979b4e4a706286438d48f0e21b0d92cc7bd40c1c3ea5b9872089aaec0124
hashafecefa6d9bd1e6d1c92144209eda320e1fe0f196ffa8e8bc114e7d3a25503f6
hashb2f733b67f1ef06d9e5ce76d3cc848f6e7e3ec2d0c363c76d5175c6cf85f979b
hashbdca9849d7263d508b7ed4dbbf86bd628932b117b45933cb28a7e78171d05cdd
hashc93e70d20ba2948a6a8a013df68e5c4d14d59e5f549417d1a76833bd1c8efd22
hashce42377d3d26853fd1718f69341c0631208138490decc8e71a5622df5e9e1f59
hashd550a2a327394148c0c3d05df2fe0156783fc313b4038e454f9aa2cb2f0f2090
hashe668ca17fcdfa818aac35f12064d10a0288d7d9c6b688966b695125b760567d6
hashe7120d45ee357f30cb602c0d93ed8d366f4b11c251c2a3cd4753c5508c3b15e5
hashfe6d0ee45a70359008b2916e5116c411a955978b5694cc457683ab7b26590e47

Threat ID: 690498dc60041281bb1cefe6

Added to database: 10/31/2025, 11:09:16 AM

Last enriched: 10/31/2025, 11:25:21 AM

Last updated: 10/31/2025, 3:20:24 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats