LATAM baited into the delivery of PureHVNC
Between August and October 2025, a phishing campaign targeted Colombian users by impersonating the Attorney General's office to deliver the PureHVNC Remote Access Trojan (RAT) via the Hijackloader malware loader. The attack chain involved sophisticated techniques such as DLL side-loading, anti-virtual machine checks, and multiple code injection methods to evade detection and maintain persistence. This campaign marks the first known use of Hijackloader to deliver PureHVNC in Spanish-speaking Latin America, signaling an evolution in regional threat actor tactics. Although primarily focused on Colombia, the use of phishing and advanced evasion techniques poses a risk to organizations with similar user profiles or language contexts. The campaign's medium severity reflects the complexity and potential for unauthorized remote access but lacks evidence of widespread exploitation beyond the initial targets. Defenders should prioritize user awareness, advanced endpoint detection, and monitoring for indicators of DLL side-loading and unusual process injections. No CVSS score is available; based on impact and exploitation complexity, the threat is assessed as medium severity.
AI Analysis
Technical Summary
This threat involves a targeted phishing campaign conducted between August and October 2025 against Colombian users. Attackers impersonated the Attorney General's office to lure victims into downloading a malicious file. The infection chain begins with the Hijackloader malware loader, which is used to deliver the PureHVNC Remote Access Trojan (RAT). PureHVNC is a remote access tool that allows attackers to gain persistent, unauthorized access to infected systems. The campaign employs advanced evasion and persistence techniques, including DLL side-loading—a method where a legitimate application loads a malicious DLL to evade detection—and anti-virtual machine (anti-VM) checks to avoid analysis in sandbox environments. Additionally, various code injection methods are used to hide malicious activity within legitimate processes, complicating detection efforts. This campaign is notable as the first observed instance of Hijackloader delivering PureHVNC to Spanish-speaking users in Latin America, indicating a shift in regional threat actor tactics and toolsets. The campaign leverages multiple MITRE ATT&CK techniques such as T1053.005 (Scheduled Task/Job), T1218.011 (Signed Binary Proxy Execution), T1204.002 (User Execution: Malicious File), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), T1497 (Virtualization/Sandbox Evasion), T1059.001 (Command and Scripting Interpreter: PowerShell), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder), T1566 (Phishing), T1027 (Obfuscated Files or Information), T1071.001 (Application Layer Protocol: Web Protocols), and T1574.002 (Hijack Execution Flow: DLL Side-Loading). No known exploits in the wild beyond this campaign have been reported, and no specific affected software versions are identified.
Potential Impact
For European organizations, the direct impact of this campaign is currently limited due to its targeting of Colombian users and Spanish-speaking Latin America. However, the techniques and malware used—Hijackloader and PureHVNC RAT—are globally relevant and could be adapted or expanded to target European entities, especially those with business or personnel links to Latin America or Spanish-speaking communities. The PureHVNC RAT enables attackers to gain persistent remote access, potentially leading to data exfiltration, espionage, credential theft, lateral movement, and disruption of operations. The use of sophisticated evasion techniques increases the likelihood of prolonged undetected presence, raising the risk of significant damage. Organizations in Europe with remote workforces, international collaborations, or exposure to phishing risks could face similar threats if attackers pivot their campaigns. The medium severity reflects a moderate but credible risk to confidentiality, integrity, and availability, particularly if the malware is deployed in critical infrastructure or sensitive environments.
Mitigation Recommendations
European organizations should implement targeted phishing awareness training emphasizing the risks of impersonation attacks and suspicious links, especially those purporting to come from official government entities. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying DLL side-loading, process injection, and anti-VM evasion techniques. Monitor for unusual scheduled tasks, registry run keys, and startup folder modifications indicative of persistence mechanisms. Employ network traffic analysis to detect anomalous outbound connections consistent with RAT command and control communications. Enforce strict application whitelisting and code-signing policies to prevent unauthorized DLL loading. Regularly update and patch systems to reduce the attack surface, even though no specific vulnerable software versions are identified. Conduct threat hunting exercises focusing on MITRE ATT&CK techniques observed in this campaign. Finally, maintain incident response readiness to quickly isolate and remediate infected hosts.
Affected Countries
Colombia, Spain, Germany, France, United Kingdom
Indicators of Compromise
- domain: 7octubredc.duckdns.org
- domain: dckis13.duckdns.org
- domain: dckis7.duckdns.org
- domain: enviopago.mysynology.net
- domain: maximo26.duckdns.org
- domain: nuevos777.duckdns.org
- domain: sofiavergara.duckdns.org
- hash: 0ea1ecf1f75e4423b86c00842dfdf39d
- hash: 4b917db1f7ddc803821b573f1bc2a91c
- hash: 5a916ebd868642889f99e654c10892ad
- hash: 1d5a6f9661525df3eba7c0924bc6ef2922155691
- hash: b60d10aa993afd8001b476f2f92588839f387eab
- hash: db97860b9c680d3519837fcfd8f4172a8cfdb1fd
- hash: 0113d9f3d93069a29458b3b4c33610aae03961014df60a9e859f3104086d886a
- hash: 14becb3a9663128543e1868d09611bd30a2b64c655dfb407a727a7f2d0fb8b7e
- hash: 1ae61edf35127264d329b7c0e2bddb7077e34cc5f9417de86ab6d2d65bad4b4f
- hash: 1bf3a1cf9bc7eded0b8994d44cf2b801bf12bc72dc23fb337ddd3a64ac235782
- hash: 22d474e729d600dcd84ce139f6208ce3e3390693afa7b52b0615174fca6d0fe2
- hash: 2cbfc482e27a2240a48d2fb6f6f740ff0f08598f83ae643a507c6f12a865dc28
- hash: 2ec31a8a36d73fa8354a7ac0c39506dbe12638a0dc1b900f57620b8d53ae987f
- hash: 33d0c63777882c9ec514be062612a56fdb1f291fcb6676c49480d3cd4501c508
- hash: 4484b0ac51536890301a0e6573b962e069e31abc4c0c6f0f6fc1bf66bf588a93
- hash: 47245b7d2d8cb6b92308deb80399e0273193d5bca39da85a6b2a87a109d18d85
- hash: 57c49cff3e71bc75641c78a5a72d8509007a18032510f607c042053c9d280511
- hash: 6d93a486e077858b75eb814e9a7bda181189d5833adce7cec75775cfda03f514
- hash: 768ca38878c5bb15650343ce49292315a9834eaf62fad14422d52510c3787228
- hash: 776bbaa44c7788e0ccd5945d583de9473b6246c44906692cb0a52e6329cb213a
- hash: 7c3d9ad3f1bd890e3552dc67093e161395d4e1fab79ec745220af1e19a279722
- hash: 7e64102405459192813541448c8fbadc481997a2065f26c848f1e3594ca404c9
- hash: 85641c8fb94e8e4c5202152dcbb2bb26646529290d984988ecb72e18d63c9bc5
- hash: 96ee786c5b6167c0f0f770efbace25e97d61e127ef7f58a879b6cf4b57e202c3
- hash: 977f2f18ff13c93406c5702f83c04a9412760e02028aefc7c1cb7d6f2797a9b5
- hash: 9e9997b54da0c633ffcf0a4fb94e67b482cf7a89522d1b254778d0c6c22c70ee
- hash: a0e4979b4e4a706286438d48f0e21b0d92cc7bd40c1c3ea5b9872089aaec0124
- hash: afecefa6d9bd1e6d1c92144209eda320e1fe0f196ffa8e8bc114e7d3a25503f6
- hash: b2f733b67f1ef06d9e5ce76d3cc848f6e7e3ec2d0c363c76d5175c6cf85f979b
- hash: bdca9849d7263d508b7ed4dbbf86bd628932b117b45933cb28a7e78171d05cdd
- hash: c93e70d20ba2948a6a8a013df68e5c4d14d59e5f549417d1a76833bd1c8efd22
- hash: ce42377d3d26853fd1718f69341c0631208138490decc8e71a5622df5e9e1f59
- hash: d550a2a327394148c0c3d05df2fe0156783fc313b4038e454f9aa2cb2f0f2090
- hash: e668ca17fcdfa818aac35f12064d10a0288d7d9c6b688966b695125b760567d6
- hash: e7120d45ee357f30cb602c0d93ed8d366f4b11c251c2a3cd4753c5508c3b15e5
- hash: fe6d0ee45a70359008b2916e5116c411a955978b5694cc457683ab7b26590e47
LATAM baited into the delivery of PureHVNC
Description
Between August and October 2025, a phishing campaign targeted Colombian users by impersonating the Attorney General's office to deliver the PureHVNC Remote Access Trojan (RAT) via the Hijackloader malware loader. The attack chain involved sophisticated techniques such as DLL side-loading, anti-virtual machine checks, and multiple code injection methods to evade detection and maintain persistence. This campaign marks the first known use of Hijackloader to deliver PureHVNC in Spanish-speaking Latin America, signaling an evolution in regional threat actor tactics. Although primarily focused on Colombia, the use of phishing and advanced evasion techniques poses a risk to organizations with similar user profiles or language contexts. The campaign's medium severity reflects the complexity and potential for unauthorized remote access but lacks evidence of widespread exploitation beyond the initial targets. Defenders should prioritize user awareness, advanced endpoint detection, and monitoring for indicators of DLL side-loading and unusual process injections. No CVSS score is available; based on impact and exploitation complexity, the threat is assessed as medium severity.
AI-Powered Analysis
Technical Analysis
This threat involves a targeted phishing campaign conducted between August and October 2025 against Colombian users. Attackers impersonated the Attorney General's office to lure victims into downloading a malicious file. The infection chain begins with the Hijackloader malware loader, which is used to deliver the PureHVNC Remote Access Trojan (RAT). PureHVNC is a remote access tool that allows attackers to gain persistent, unauthorized access to infected systems. The campaign employs advanced evasion and persistence techniques, including DLL side-loading—a method where a legitimate application loads a malicious DLL to evade detection—and anti-virtual machine (anti-VM) checks to avoid analysis in sandbox environments. Additionally, various code injection methods are used to hide malicious activity within legitimate processes, complicating detection efforts. This campaign is notable as the first observed instance of Hijackloader delivering PureHVNC to Spanish-speaking users in Latin America, indicating a shift in regional threat actor tactics and toolsets. The campaign leverages multiple MITRE ATT&CK techniques such as T1053.005 (Scheduled Task/Job), T1218.011 (Signed Binary Proxy Execution), T1204.002 (User Execution: Malicious File), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), T1497 (Virtualization/Sandbox Evasion), T1059.001 (Command and Scripting Interpreter: PowerShell), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder), T1566 (Phishing), T1027 (Obfuscated Files or Information), T1071.001 (Application Layer Protocol: Web Protocols), and T1574.002 (Hijack Execution Flow: DLL Side-Loading). No known exploits in the wild beyond this campaign have been reported, and no specific affected software versions are identified.
Potential Impact
For European organizations, the direct impact of this campaign is currently limited due to its targeting of Colombian users and Spanish-speaking Latin America. However, the techniques and malware used—Hijackloader and PureHVNC RAT—are globally relevant and could be adapted or expanded to target European entities, especially those with business or personnel links to Latin America or Spanish-speaking communities. The PureHVNC RAT enables attackers to gain persistent remote access, potentially leading to data exfiltration, espionage, credential theft, lateral movement, and disruption of operations. The use of sophisticated evasion techniques increases the likelihood of prolonged undetected presence, raising the risk of significant damage. Organizations in Europe with remote workforces, international collaborations, or exposure to phishing risks could face similar threats if attackers pivot their campaigns. The medium severity reflects a moderate but credible risk to confidentiality, integrity, and availability, particularly if the malware is deployed in critical infrastructure or sensitive environments.
Mitigation Recommendations
European organizations should implement targeted phishing awareness training emphasizing the risks of impersonation attacks and suspicious links, especially those purporting to come from official government entities. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying DLL side-loading, process injection, and anti-VM evasion techniques. Monitor for unusual scheduled tasks, registry run keys, and startup folder modifications indicative of persistence mechanisms. Employ network traffic analysis to detect anomalous outbound connections consistent with RAT command and control communications. Enforce strict application whitelisting and code-signing policies to prevent unauthorized DLL loading. Regularly update and patch systems to reduce the attack surface, even though no specific vulnerable software versions are identified. Conduct threat hunting exercises focusing on MITRE ATT&CK techniques observed in this campaign. Finally, maintain incident response readiness to quickly isolate and remediate infected hosts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.ibm.com/think/x-force/latam-baited-into-delivery-of-purehvnc"]
- Adversary
- null
- Pulse Id
- 6904821fa7d50264deb316a4
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy | 
|---|---|---|
| domain7octubredc.duckdns.org | — | |
| domaindckis13.duckdns.org | — | |
| domaindckis7.duckdns.org | — | |
| domainenviopago.mysynology.net | — | |
| domainmaximo26.duckdns.org | — | |
| domainnuevos777.duckdns.org | — | |
| domainsofiavergara.duckdns.org | — | 
Hash
| Value | Description | Copy | 
|---|---|---|
| hash0ea1ecf1f75e4423b86c00842dfdf39d | MD5 of 85641c8fb94e8e4c5202152dcbb2bb26646529290d984988ecb72e18d63c9bc5 | |
| hash4b917db1f7ddc803821b573f1bc2a91c | MD5 of 33d0c63777882c9ec514be062612a56fdb1f291fcb6676c49480d3cd4501c508 | |
| hash5a916ebd868642889f99e654c10892ad | MD5 of afecefa6d9bd1e6d1c92144209eda320e1fe0f196ffa8e8bc114e7d3a25503f6 | |
| hash1d5a6f9661525df3eba7c0924bc6ef2922155691 | SHA1 of 85641c8fb94e8e4c5202152dcbb2bb26646529290d984988ecb72e18d63c9bc5 | |
| hashb60d10aa993afd8001b476f2f92588839f387eab | SHA1 of 33d0c63777882c9ec514be062612a56fdb1f291fcb6676c49480d3cd4501c508 | |
| hashdb97860b9c680d3519837fcfd8f4172a8cfdb1fd | SHA1 of afecefa6d9bd1e6d1c92144209eda320e1fe0f196ffa8e8bc114e7d3a25503f6 | |
| hash0113d9f3d93069a29458b3b4c33610aae03961014df60a9e859f3104086d886a | — | |
| hash14becb3a9663128543e1868d09611bd30a2b64c655dfb407a727a7f2d0fb8b7e | — | |
| hash1ae61edf35127264d329b7c0e2bddb7077e34cc5f9417de86ab6d2d65bad4b4f | — | |
| hash1bf3a1cf9bc7eded0b8994d44cf2b801bf12bc72dc23fb337ddd3a64ac235782 | — | |
| hash22d474e729d600dcd84ce139f6208ce3e3390693afa7b52b0615174fca6d0fe2 | — | |
| hash2cbfc482e27a2240a48d2fb6f6f740ff0f08598f83ae643a507c6f12a865dc28 | — | |
| hash2ec31a8a36d73fa8354a7ac0c39506dbe12638a0dc1b900f57620b8d53ae987f | — | |
| hash33d0c63777882c9ec514be062612a56fdb1f291fcb6676c49480d3cd4501c508 | — | |
| hash4484b0ac51536890301a0e6573b962e069e31abc4c0c6f0f6fc1bf66bf588a93 | — | |
| hash47245b7d2d8cb6b92308deb80399e0273193d5bca39da85a6b2a87a109d18d85 | — | |
| hash57c49cff3e71bc75641c78a5a72d8509007a18032510f607c042053c9d280511 | — | |
| hash6d93a486e077858b75eb814e9a7bda181189d5833adce7cec75775cfda03f514 | — | |
| hash768ca38878c5bb15650343ce49292315a9834eaf62fad14422d52510c3787228 | — | |
| hash776bbaa44c7788e0ccd5945d583de9473b6246c44906692cb0a52e6329cb213a | — | |
| hash7c3d9ad3f1bd890e3552dc67093e161395d4e1fab79ec745220af1e19a279722 | — | |
| hash7e64102405459192813541448c8fbadc481997a2065f26c848f1e3594ca404c9 | — | |
| hash85641c8fb94e8e4c5202152dcbb2bb26646529290d984988ecb72e18d63c9bc5 | — | |
| hash96ee786c5b6167c0f0f770efbace25e97d61e127ef7f58a879b6cf4b57e202c3 | — | |
| hash977f2f18ff13c93406c5702f83c04a9412760e02028aefc7c1cb7d6f2797a9b5 | — | |
| hash9e9997b54da0c633ffcf0a4fb94e67b482cf7a89522d1b254778d0c6c22c70ee | — | |
| hasha0e4979b4e4a706286438d48f0e21b0d92cc7bd40c1c3ea5b9872089aaec0124 | — | |
| hashafecefa6d9bd1e6d1c92144209eda320e1fe0f196ffa8e8bc114e7d3a25503f6 | — | |
| hashb2f733b67f1ef06d9e5ce76d3cc848f6e7e3ec2d0c363c76d5175c6cf85f979b | — | |
| hashbdca9849d7263d508b7ed4dbbf86bd628932b117b45933cb28a7e78171d05cdd | — | |
| hashc93e70d20ba2948a6a8a013df68e5c4d14d59e5f549417d1a76833bd1c8efd22 | — | |
| hashce42377d3d26853fd1718f69341c0631208138490decc8e71a5622df5e9e1f59 | — | |
| hashd550a2a327394148c0c3d05df2fe0156783fc313b4038e454f9aa2cb2f0f2090 | — | |
| hashe668ca17fcdfa818aac35f12064d10a0288d7d9c6b688966b695125b760567d6 | — | |
| hashe7120d45ee357f30cb602c0d93ed8d366f4b11c251c2a3cd4753c5508c3b15e5 | — | |
| hashfe6d0ee45a70359008b2916e5116c411a955978b5694cc457683ab7b26590e47 | — | 
Threat ID: 690498dc60041281bb1cefe6
Added to database: 10/31/2025, 11:09:16 AM
Last enriched: 10/31/2025, 11:25:21 AM
Last updated: 10/31/2025, 3:20:24 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Ukrainian Conti Ransomware Suspect Extradited to US from Ireland
MediumFrom Brazil with Love: New Tactics from Lampion
MediumNew wave of cyberattacks by APT group Cloud Atlas on Russia's government sector
MediumNew Loader Executing TorNet and PureHVNC
MediumTracking an evolving Discord-based RAT family
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.