Under the Pure Curtain: From RAT to Builder to Coder
Check Point Research conducted a forensic analysis of a ClickFix campaign that deployed multiple tools, including a Rust Loader, PureHVNC RAT, and the Sliver command-and-control framework. The analysis provided comprehensive insights into PureHVNC RAT, including its commands and plugins. The investigation revealed connections to GitHub accounts linked to the developer of Pure malware families, PureCoder. Analysis of these accounts indicated a timezone of operation (UTC+0300) and potential countries of residence. The research also uncovered a PureRAT builder, offering insights into the RAT's capabilities and features related to PureCrypter, another tool by PureCoder. This investigation enhances understanding of the Pure malware ecosystem and provides actionable intelligence for cybersecurity professionals.
AI Analysis
Technical Summary
The analyzed threat revolves around a sophisticated malware campaign dubbed 'ClickFix,' which employs a multi-tool ecosystem developed by an adversary group or individual known as PureCoder. The campaign utilizes several components, including a Rust-based loader, the PureHVNC Remote Access Trojan (RAT), and the Sliver command-and-control (C2) framework. The forensic analysis by Check Point Research reveals that PureHVNC RAT is a modular and feature-rich malware capable of executing a wide range of commands and plugins, enabling attackers to perform reconnaissance, persistence, credential theft, lateral movement, and data exfiltration. The investigation also uncovered a PureRAT builder tool, which facilitates the creation of customized RAT payloads, and a PureCrypter tool designed to obfuscate and evade detection. The malware ecosystem is linked to GitHub accounts associated with PureCoder, providing insights into the developer’s operational timezone (UTC+0300) and suggesting potential geographic origins. The campaign’s use of Rust for the loader indicates an emphasis on stealth and performance, while the integration with Sliver C2 framework highlights the attackers’ capability to maintain robust command and control infrastructure. The malware employs numerous tactics, techniques, and procedures (TTPs) mapped to MITRE ATT&CK, including credential dumping, process injection, persistence mechanisms, and command obfuscation, reflecting a mature and adaptable threat actor. Although no known exploits in the wild have been reported, the comprehensive capabilities and modularity of the Pure malware family pose a significant risk to targeted environments.
Potential Impact
For European organizations, the Pure malware ecosystem represents a medium-severity threat with potential to disrupt operations, compromise sensitive data, and facilitate espionage or financial theft. The RAT’s extensive command set and plugins enable attackers to gain persistent access, move laterally within networks, and exfiltrate confidential information. Organizations in sectors such as finance, government, critical infrastructure, and technology are particularly at risk due to the potential value of the data targeted and the strategic importance of these sectors. The use of a Rust loader and advanced obfuscation techniques complicates detection and incident response efforts, increasing dwell time and potential damage. Additionally, the malware’s modular builder tools lower the barrier for customization and deployment, potentially expanding the threat’s reach. While no active exploits have been reported, the presence of detailed intelligence and tooling in public repositories suggests a risk of future campaigns leveraging these capabilities. European entities must be vigilant against targeted phishing or spear-phishing campaigns, as the malware’s initial infection vector is associated with the ClickFix campaign, which likely involves social engineering.
Mitigation Recommendations
To mitigate the threat posed by the Pure malware ecosystem, European organizations should implement targeted and advanced defensive measures beyond standard best practices. These include: 1) Deploying endpoint detection and response (EDR) solutions capable of identifying Rust-based loaders and unusual process injection behaviors; 2) Monitoring network traffic for anomalies consistent with Sliver C2 communications, including uncommon protocols or encrypted outbound connections to suspicious domains; 3) Implementing strict application whitelisting and code signing policies to prevent unauthorized execution of builder-generated payloads; 4) Conducting regular threat hunting exercises focused on MITRE ATT&CK techniques associated with Pure malware, such as credential dumping (T1003), persistence (T1547), and process injection (T1055); 5) Enhancing phishing awareness training tailored to the ClickFix campaign’s social engineering tactics; 6) Restricting administrative privileges and employing multi-factor authentication to limit lateral movement and credential abuse; 7) Utilizing threat intelligence feeds to update detection rules with indicators of compromise (IOCs) related to PureCoder’s tools and infrastructure; 8) Reviewing and hardening GitHub and other developer platform monitoring to detect potential leakages or tool updates; and 9) Establishing incident response playbooks specific to RAT infections and C2 framework intrusions to reduce response times and impact.
Affected Countries
Germany, France, United Kingdom, Netherlands, Poland, Italy, Spain
Indicators of Compromise
- hash: 0bb01a45f259d2b5656f702c2cd04057
- hash: 15c1981ffdccd14f14cc6441e9154956
- hash: 2fe966894cecedff428b210d2a4cd0ed
- hash: 6e8ba8f7f8da138bb05124667a03a268
- hash: c4a6e5a66a77a0b11c04c740c6fc6f77
- hash: f3992c270d76a66ea540f25d716f66a7
- hash: 03d1d4a02fbd4c72b8ea9826a219a0511a62a974
- hash: 11e0357a36bd6e908cf9f6e7834cc201a70d692a
- hash: 17e14b3ccf309fd9b5f7a5068a5ceddd15fdea0f
- hash: 2e5050c50d3a8e9f376f0ae9394cf265ed3dcf06
- hash: 34ec79ab8a00dc6908874cdf7762756a2dca4274
- hash: 39d3b6bee5450d82d096ad7bdf4244fcb7b1eb81
- hash: 44ceaa27e81a9a9f218fff2c720b72390ff1c6c3
- hash: 4b0fa1d022d409825bb2a872e245ebc9b2bcaff2
- hash: 4cf36f75defc34cbd1b50c23e932f8d9a87dca9b
- hash: 564db1627658feb61fe87b07659d371c371a4a41
- hash: 647343bed2af6e8c16f296d626d98cdfd0f84cf0
- hash: 7075fb417919b4ae9335ee7abeb9553953c8aac8
- hash: 795fba180464a965f99fc2a50c5a3fad38a6939a
- hash: 7b133998e526b3bee151329171c82ca1837c86f9
- hash: 7f851ca85ec9136486692f283ff16c79a1a211ca
- hash: 831bcb77a070b342115c68ced7cb22c0c778006f
- hash: 85513077aadbe50fe68055f0420da2e6b97bd30d
- hash: 85e444601df3b756209667504c39116a60e0e3d3
- hash: 8c302d85720b3fa2a8ecceffe1aa7cd23efbe9b5
- hash: 98ac16ba3e512e495ebf8da7e1ea6bea904ea69b
- hash: 99cbbe5f68d50b79af8fb748f51794de137f4fe4
- hash: b8c385aa07aba1344cccfd92fcda2db9dbda9855
- hash: d340b780194d44ee9b8d32f596b5a13723abbe1d
- hash: d4fff01e37aff04bf8d4314833c8a5ab9e23aca7
- hash: e3a79ce291546191a5ddb039b2f9bf523bb9c4fb
- hash: f388ef87fcd48a2fe00fa449c1987115e5fe35c8
- hash: 07a81384135c5803b96a4d15901927c247ec966cfc45792ddf3e25ba47038461
- hash: 0f8a8342841ea814cda72369e1b48284d469c98f7d743f446e8ce81b37e961ff
- hash: 1c85ecffd0e3da36a4bc154bf20b9243590eab3efa2bc7ac756ec8d33ff2767a
- hash: 4a01d45563d802fee5593a21f1b216aeed83c4dff50fa6a31391ff73feb29dbd
- hash: 8721b9b49b44b3f034d1d2f609d52f1fc09475d1cc6ced4f4e8f521c1d84f33f
- hash: ae71480c394f24e1c0f4384ad417cc2749d8914f693ad34b9df5136f8799c19b
- hash: aec367496ba29710f16691333a2bb992122b6daf832689c1b8f843d89d9b3b62
- hash: bf83184822bf184536b50dff4758edd638b59cb82a06ee019b62b0bce33d07b5
- hash: f582cc1d41671abbd3ec37deb6eafb78d5365867df0948a288f34fcf1d8f9a08
- domain: dndhub.xyz
- domain: dsgnfwd.xyz
- domain: mktblend.monster
- domain: stategiq.quest
- domain: stathub.quest
Under the Pure Curtain: From RAT to Builder to Coder
Description
Check Point Research conducted a forensic analysis of a ClickFix campaign that deployed multiple tools, including a Rust Loader, PureHVNC RAT, and the Sliver command-and-control framework. The analysis provided comprehensive insights into PureHVNC RAT, including its commands and plugins. The investigation revealed connections to GitHub accounts linked to the developer of Pure malware families, PureCoder. Analysis of these accounts indicated a timezone of operation (UTC+0300) and potential countries of residence. The research also uncovered a PureRAT builder, offering insights into the RAT's capabilities and features related to PureCrypter, another tool by PureCoder. This investigation enhances understanding of the Pure malware ecosystem and provides actionable intelligence for cybersecurity professionals.
AI-Powered Analysis
Technical Analysis
The analyzed threat revolves around a sophisticated malware campaign dubbed 'ClickFix,' which employs a multi-tool ecosystem developed by an adversary group or individual known as PureCoder. The campaign utilizes several components, including a Rust-based loader, the PureHVNC Remote Access Trojan (RAT), and the Sliver command-and-control (C2) framework. The forensic analysis by Check Point Research reveals that PureHVNC RAT is a modular and feature-rich malware capable of executing a wide range of commands and plugins, enabling attackers to perform reconnaissance, persistence, credential theft, lateral movement, and data exfiltration. The investigation also uncovered a PureRAT builder tool, which facilitates the creation of customized RAT payloads, and a PureCrypter tool designed to obfuscate and evade detection. The malware ecosystem is linked to GitHub accounts associated with PureCoder, providing insights into the developer’s operational timezone (UTC+0300) and suggesting potential geographic origins. The campaign’s use of Rust for the loader indicates an emphasis on stealth and performance, while the integration with Sliver C2 framework highlights the attackers’ capability to maintain robust command and control infrastructure. The malware employs numerous tactics, techniques, and procedures (TTPs) mapped to MITRE ATT&CK, including credential dumping, process injection, persistence mechanisms, and command obfuscation, reflecting a mature and adaptable threat actor. Although no known exploits in the wild have been reported, the comprehensive capabilities and modularity of the Pure malware family pose a significant risk to targeted environments.
Potential Impact
For European organizations, the Pure malware ecosystem represents a medium-severity threat with potential to disrupt operations, compromise sensitive data, and facilitate espionage or financial theft. The RAT’s extensive command set and plugins enable attackers to gain persistent access, move laterally within networks, and exfiltrate confidential information. Organizations in sectors such as finance, government, critical infrastructure, and technology are particularly at risk due to the potential value of the data targeted and the strategic importance of these sectors. The use of a Rust loader and advanced obfuscation techniques complicates detection and incident response efforts, increasing dwell time and potential damage. Additionally, the malware’s modular builder tools lower the barrier for customization and deployment, potentially expanding the threat’s reach. While no active exploits have been reported, the presence of detailed intelligence and tooling in public repositories suggests a risk of future campaigns leveraging these capabilities. European entities must be vigilant against targeted phishing or spear-phishing campaigns, as the malware’s initial infection vector is associated with the ClickFix campaign, which likely involves social engineering.
Mitigation Recommendations
To mitigate the threat posed by the Pure malware ecosystem, European organizations should implement targeted and advanced defensive measures beyond standard best practices. These include: 1) Deploying endpoint detection and response (EDR) solutions capable of identifying Rust-based loaders and unusual process injection behaviors; 2) Monitoring network traffic for anomalies consistent with Sliver C2 communications, including uncommon protocols or encrypted outbound connections to suspicious domains; 3) Implementing strict application whitelisting and code signing policies to prevent unauthorized execution of builder-generated payloads; 4) Conducting regular threat hunting exercises focused on MITRE ATT&CK techniques associated with Pure malware, such as credential dumping (T1003), persistence (T1547), and process injection (T1055); 5) Enhancing phishing awareness training tailored to the ClickFix campaign’s social engineering tactics; 6) Restricting administrative privileges and employing multi-factor authentication to limit lateral movement and credential abuse; 7) Utilizing threat intelligence feeds to update detection rules with indicators of compromise (IOCs) related to PureCoder’s tools and infrastructure; 8) Reviewing and hardening GitHub and other developer platform monitoring to detect potential leakages or tool updates; and 9) Establishing incident response playbooks specific to RAT infections and C2 framework intrusions to reduce response times and impact.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2025/under-the-pure-curtain-from-rat-to-builder-to-coder"]
- Adversary
- PureCoder
- Pulse Id
- 68c9d89fdb056290ee763876
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash0bb01a45f259d2b5656f702c2cd04057 | — | |
hash15c1981ffdccd14f14cc6441e9154956 | — | |
hash2fe966894cecedff428b210d2a4cd0ed | — | |
hash6e8ba8f7f8da138bb05124667a03a268 | — | |
hashc4a6e5a66a77a0b11c04c740c6fc6f77 | — | |
hashf3992c270d76a66ea540f25d716f66a7 | — | |
hash03d1d4a02fbd4c72b8ea9826a219a0511a62a974 | — | |
hash11e0357a36bd6e908cf9f6e7834cc201a70d692a | — | |
hash17e14b3ccf309fd9b5f7a5068a5ceddd15fdea0f | — | |
hash2e5050c50d3a8e9f376f0ae9394cf265ed3dcf06 | — | |
hash34ec79ab8a00dc6908874cdf7762756a2dca4274 | — | |
hash39d3b6bee5450d82d096ad7bdf4244fcb7b1eb81 | — | |
hash44ceaa27e81a9a9f218fff2c720b72390ff1c6c3 | — | |
hash4b0fa1d022d409825bb2a872e245ebc9b2bcaff2 | — | |
hash4cf36f75defc34cbd1b50c23e932f8d9a87dca9b | — | |
hash564db1627658feb61fe87b07659d371c371a4a41 | — | |
hash647343bed2af6e8c16f296d626d98cdfd0f84cf0 | — | |
hash7075fb417919b4ae9335ee7abeb9553953c8aac8 | — | |
hash795fba180464a965f99fc2a50c5a3fad38a6939a | — | |
hash7b133998e526b3bee151329171c82ca1837c86f9 | — | |
hash7f851ca85ec9136486692f283ff16c79a1a211ca | — | |
hash831bcb77a070b342115c68ced7cb22c0c778006f | — | |
hash85513077aadbe50fe68055f0420da2e6b97bd30d | — | |
hash85e444601df3b756209667504c39116a60e0e3d3 | — | |
hash8c302d85720b3fa2a8ecceffe1aa7cd23efbe9b5 | — | |
hash98ac16ba3e512e495ebf8da7e1ea6bea904ea69b | — | |
hash99cbbe5f68d50b79af8fb748f51794de137f4fe4 | — | |
hashb8c385aa07aba1344cccfd92fcda2db9dbda9855 | — | |
hashd340b780194d44ee9b8d32f596b5a13723abbe1d | — | |
hashd4fff01e37aff04bf8d4314833c8a5ab9e23aca7 | — | |
hashe3a79ce291546191a5ddb039b2f9bf523bb9c4fb | — | |
hashf388ef87fcd48a2fe00fa449c1987115e5fe35c8 | — | |
hash07a81384135c5803b96a4d15901927c247ec966cfc45792ddf3e25ba47038461 | — | |
hash0f8a8342841ea814cda72369e1b48284d469c98f7d743f446e8ce81b37e961ff | — | |
hash1c85ecffd0e3da36a4bc154bf20b9243590eab3efa2bc7ac756ec8d33ff2767a | — | |
hash4a01d45563d802fee5593a21f1b216aeed83c4dff50fa6a31391ff73feb29dbd | — | |
hash8721b9b49b44b3f034d1d2f609d52f1fc09475d1cc6ced4f4e8f521c1d84f33f | — | |
hashae71480c394f24e1c0f4384ad417cc2749d8914f693ad34b9df5136f8799c19b | — | |
hashaec367496ba29710f16691333a2bb992122b6daf832689c1b8f843d89d9b3b62 | — | |
hashbf83184822bf184536b50dff4758edd638b59cb82a06ee019b62b0bce33d07b5 | — | |
hashf582cc1d41671abbd3ec37deb6eafb78d5365867df0948a288f34fcf1d8f9a08 | — |
Domain
Value | Description | Copy |
---|---|---|
domaindndhub.xyz | — | |
domaindsgnfwd.xyz | — | |
domainmktblend.monster | — | |
domainstategiq.quest | — | |
domainstathub.quest | — |
Threat ID: 68ca9a856f90669b55758ca4
Added to database: 9/17/2025, 11:24:53 AM
Last enriched: 9/17/2025, 11:25:15 AM
Last updated: 9/19/2025, 3:22:48 AM
Views: 13
Related Threats
ThreatFox IOCs for 2025-09-18
MediumFake Empire Podcast Invites Target Crypto Industry with macOS AMOS Stealer
MediumMalicious PyPI Packages Deliver SilentSync RAT
Medium"Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack
MediumThreatFox IOCs for 2025-09-17
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.