Reoccurring Use of Highly Suspicious PDF Editors to Infiltrate Environments
Since November 19, 2025, a suspicious PDF editor named 'ConvertMate' has been identified as a malicious vector infiltrating environments. Although it appears as a legitimate PDF converter, it performs unauthorized external connections, host queries, and creates artifacts indicative of compromise. It executes a PowerShell script that installs a scheduled task to repeat its malicious behavior every 24 hours. This activity closely resembles the earlier 'PDFEditor' campaign, with both files signed by the same entity, suggesting a coordinated threat actor. Immediate isolation and removal of 'ConvertMate' and related artifacts are critical. End-user training to recognize suspicious files and ads is also recommended. The threat does not require user interaction beyond initial download and installation, and no known exploits are publicly reported yet. The medium severity reflects its persistence and stealth but limited current exploitation scope.
AI Analysis
Technical Summary
The threat involves a malicious software masquerading as a PDF editor named 'ConvertMate,' first observed in November 2025. This file is distributed via specific suspicious domains and initially appears benign. However, upon execution, it initiates unauthorized external network connections and performs host queries, indicating reconnaissance or command-and-control communication. It also creates multiple artifacts on the host system, including the execution of a PowerShell script that adds a scheduled task to maintain persistence by repeating the suspicious activity every 24 hours. The behavior and digital signature link it to a previous campaign known as 'PDFEditor,' suggesting the same threat actor or group is behind both. The campaign leverages social engineering by presenting itself as a useful PDF converter, thus tricking users into installing it. The lack of a CVE or known public exploits indicates it is a relatively new or targeted threat. The scheduled task mechanism ensures ongoing access and potential data exfiltration or lateral movement within compromised networks. The threat intelligence source recommends immediate isolation and removal of the software and related artifacts, alongside user awareness training to prevent infection via malicious ads or downloads.
Potential Impact
For European organizations, this threat poses a risk of persistent compromise through a seemingly legitimate application, potentially leading to unauthorized data access, espionage, or lateral movement within networks. The scheduled task ensures the malware maintains foothold, increasing the difficulty of eradication. Organizations relying on PDF editing tools or with users prone to downloading software from unverified sources are particularly vulnerable. The external connections could facilitate data exfiltration or command-and-control communications, risking confidentiality breaches. The stealthy nature and persistence mechanisms could disrupt business operations if critical systems are affected. Additionally, the threat could be leveraged to deploy further payloads or ransomware, amplifying impact. The medium severity suggests that while the threat is not currently widespread or highly destructive, it has significant potential to cause harm if not addressed promptly.
Mitigation Recommendations
1. Immediately identify and isolate any systems with 'ConvertMate' installed using the provided file hashes and domain indicators. 2. Remove the software and all related artifacts, including scheduled tasks and PowerShell scripts, to prevent persistence. 3. Implement strict application whitelisting to block unauthorized PDF editors or unknown software installations. 4. Monitor network traffic for connections to the suspicious domains listed and block them at the firewall or proxy level. 5. Conduct user awareness training focused on recognizing malicious ads, suspicious downloads, and the risks of installing unverified software. 6. Employ endpoint detection and response (EDR) solutions to detect and remediate suspicious PowerShell activity and scheduled task creation. 7. Regularly audit scheduled tasks and startup items for unauthorized entries. 8. Maintain updated threat intelligence feeds to detect emerging variants or related campaigns. 9. Enforce least privilege principles to limit the ability of malware to create scheduled tasks or execute scripts. 10. Perform thorough incident response investigations on affected hosts to ensure complete eradication and identify potential lateral movement.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
Indicators of Compromise
- hash: 192b80bab47bce9b96f683409db2fe61
- hash: 2df67805a1ef4c69b1de46e484fde896
- hash: 4f6d977574cba1eaae21406d60a93e9c
- hash: ac2abc01b351aca0359a8d2bf0f3a78a
- hash: 0f0e7f2098ffbe68c40969fbd6db30a164a3008f
- hash: 96d267ef0df898a8351b5ce1f960b223440128e8
- hash: a1e5b15089203f455b9b9e8ce52ab3f5f086cdd5
- hash: c60c964e4e0d40e5d038950d75db60b84d4cd911
- hash: 08b9f93000512b45f8c2e8d3d6624536b366e67c40fd4b958db58e3a1d129c3d
- hash: 09c2af472ab86b62a702e94a39df2bef09205f4249ed871cbeece751c1e7ef4f
- hash: 372d89d7dd45b2120f45705a4aa331dfff813a4be642971422e470eb725c4646
- hash: d9f9584f4f071be9c5cf418cae91423c51d53ecf9924ed39b42028d1314a2edc
- domain: chrialletworton.com
- domain: climatcon.com
- domain: dcownil.com
- domain: trm.conmateapp.com
- domain: vo.takelecon.com
Reoccurring Use of Highly Suspicious PDF Editors to Infiltrate Environments
Description
Since November 19, 2025, a suspicious PDF editor named 'ConvertMate' has been identified as a malicious vector infiltrating environments. Although it appears as a legitimate PDF converter, it performs unauthorized external connections, host queries, and creates artifacts indicative of compromise. It executes a PowerShell script that installs a scheduled task to repeat its malicious behavior every 24 hours. This activity closely resembles the earlier 'PDFEditor' campaign, with both files signed by the same entity, suggesting a coordinated threat actor. Immediate isolation and removal of 'ConvertMate' and related artifacts are critical. End-user training to recognize suspicious files and ads is also recommended. The threat does not require user interaction beyond initial download and installation, and no known exploits are publicly reported yet. The medium severity reflects its persistence and stealth but limited current exploitation scope.
AI-Powered Analysis
Technical Analysis
The threat involves a malicious software masquerading as a PDF editor named 'ConvertMate,' first observed in November 2025. This file is distributed via specific suspicious domains and initially appears benign. However, upon execution, it initiates unauthorized external network connections and performs host queries, indicating reconnaissance or command-and-control communication. It also creates multiple artifacts on the host system, including the execution of a PowerShell script that adds a scheduled task to maintain persistence by repeating the suspicious activity every 24 hours. The behavior and digital signature link it to a previous campaign known as 'PDFEditor,' suggesting the same threat actor or group is behind both. The campaign leverages social engineering by presenting itself as a useful PDF converter, thus tricking users into installing it. The lack of a CVE or known public exploits indicates it is a relatively new or targeted threat. The scheduled task mechanism ensures ongoing access and potential data exfiltration or lateral movement within compromised networks. The threat intelligence source recommends immediate isolation and removal of the software and related artifacts, alongside user awareness training to prevent infection via malicious ads or downloads.
Potential Impact
For European organizations, this threat poses a risk of persistent compromise through a seemingly legitimate application, potentially leading to unauthorized data access, espionage, or lateral movement within networks. The scheduled task ensures the malware maintains foothold, increasing the difficulty of eradication. Organizations relying on PDF editing tools or with users prone to downloading software from unverified sources are particularly vulnerable. The external connections could facilitate data exfiltration or command-and-control communications, risking confidentiality breaches. The stealthy nature and persistence mechanisms could disrupt business operations if critical systems are affected. Additionally, the threat could be leveraged to deploy further payloads or ransomware, amplifying impact. The medium severity suggests that while the threat is not currently widespread or highly destructive, it has significant potential to cause harm if not addressed promptly.
Mitigation Recommendations
1. Immediately identify and isolate any systems with 'ConvertMate' installed using the provided file hashes and domain indicators. 2. Remove the software and all related artifacts, including scheduled tasks and PowerShell scripts, to prevent persistence. 3. Implement strict application whitelisting to block unauthorized PDF editors or unknown software installations. 4. Monitor network traffic for connections to the suspicious domains listed and block them at the firewall or proxy level. 5. Conduct user awareness training focused on recognizing malicious ads, suspicious downloads, and the risks of installing unverified software. 6. Employ endpoint detection and response (EDR) solutions to detect and remediate suspicious PowerShell activity and scheduled task creation. 7. Regularly audit scheduled tasks and startup items for unauthorized entries. 8. Maintain updated threat intelligence feeds to detect emerging variants or related campaigns. 9. Enforce least privilege principles to limit the ability of malware to create scheduled tasks or execute scripts. 10. Perform thorough incident response investigations on affected hosts to ensure complete eradication and identify potential lateral movement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.truesec.com/hub/blog/reoccurring-use-of-highly-suspicious-pdf-editors-to-infiltrate-environments"]
- Adversary
- null
- Pulse Id
- 691fdab8adc456247cd148bd
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash192b80bab47bce9b96f683409db2fe61 | — | |
hash2df67805a1ef4c69b1de46e484fde896 | — | |
hash4f6d977574cba1eaae21406d60a93e9c | — | |
hashac2abc01b351aca0359a8d2bf0f3a78a | — | |
hash0f0e7f2098ffbe68c40969fbd6db30a164a3008f | — | |
hash96d267ef0df898a8351b5ce1f960b223440128e8 | — | |
hasha1e5b15089203f455b9b9e8ce52ab3f5f086cdd5 | — | |
hashc60c964e4e0d40e5d038950d75db60b84d4cd911 | — | |
hash08b9f93000512b45f8c2e8d3d6624536b366e67c40fd4b958db58e3a1d129c3d | — | |
hash09c2af472ab86b62a702e94a39df2bef09205f4249ed871cbeece751c1e7ef4f | — | |
hash372d89d7dd45b2120f45705a4aa331dfff813a4be642971422e470eb725c4646 | — | |
hashd9f9584f4f071be9c5cf418cae91423c51d53ecf9924ed39b42028d1314a2edc | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainchrialletworton.com | — | |
domainclimatcon.com | — | |
domaindcownil.com | — | |
domaintrm.conmateapp.com | — | |
domainvo.takelecon.com | — |
Threat ID: 692032cfb6fc887540a02d61
Added to database: 11/21/2025, 9:37:19 AM
Last enriched: 11/21/2025, 9:53:59 AM
Last updated: 11/21/2025, 3:26:10 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Chinese Cyberspies Deploy ‘BadAudio’ Malware via Supply Chain Attacks
MediumThe Tsundere botnet uses the Ethereum blockchain to infect its targets
MediumTsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
MediumThreatFox IOCs for 2025-11-20
MediumNew Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.