Skip to main content

Under the Pure Curtain: From RAT to Builder to Coder

Medium
Published: Tue Sep 16 2025 (09/16/2025, 21:37:35 UTC)
Source: AlienVault OTX General

Description

Check Point Research conducted a forensic analysis of a ClickFix campaign that deployed multiple tools, including a Rust Loader, PureHVNC RAT, and the Sliver command-and-control framework. The analysis provided comprehensive insights into PureHVNC RAT, including its commands and plugins. The investigation revealed connections to GitHub accounts linked to the developer of Pure malware families, PureCoder. Analysis of these accounts indicated a timezone of operation (UTC+0300) and potential countries of residence. The research also uncovered a PureRAT builder, offering insights into the RAT's capabilities and features related to PureCrypter, another tool by PureCoder. This investigation enhances understanding of the Pure malware ecosystem and provides actionable intelligence for cybersecurity professionals.

AI-Powered Analysis

AILast updated: 09/17/2025, 11:25:15 UTC

Technical Analysis

The analyzed threat revolves around a sophisticated malware campaign dubbed 'ClickFix,' which employs a multi-tool ecosystem developed by an adversary group or individual known as PureCoder. The campaign utilizes several components, including a Rust-based loader, the PureHVNC Remote Access Trojan (RAT), and the Sliver command-and-control (C2) framework. The forensic analysis by Check Point Research reveals that PureHVNC RAT is a modular and feature-rich malware capable of executing a wide range of commands and plugins, enabling attackers to perform reconnaissance, persistence, credential theft, lateral movement, and data exfiltration. The investigation also uncovered a PureRAT builder tool, which facilitates the creation of customized RAT payloads, and a PureCrypter tool designed to obfuscate and evade detection. The malware ecosystem is linked to GitHub accounts associated with PureCoder, providing insights into the developer’s operational timezone (UTC+0300) and suggesting potential geographic origins. The campaign’s use of Rust for the loader indicates an emphasis on stealth and performance, while the integration with Sliver C2 framework highlights the attackers’ capability to maintain robust command and control infrastructure. The malware employs numerous tactics, techniques, and procedures (TTPs) mapped to MITRE ATT&CK, including credential dumping, process injection, persistence mechanisms, and command obfuscation, reflecting a mature and adaptable threat actor. Although no known exploits in the wild have been reported, the comprehensive capabilities and modularity of the Pure malware family pose a significant risk to targeted environments.

Potential Impact

For European organizations, the Pure malware ecosystem represents a medium-severity threat with potential to disrupt operations, compromise sensitive data, and facilitate espionage or financial theft. The RAT’s extensive command set and plugins enable attackers to gain persistent access, move laterally within networks, and exfiltrate confidential information. Organizations in sectors such as finance, government, critical infrastructure, and technology are particularly at risk due to the potential value of the data targeted and the strategic importance of these sectors. The use of a Rust loader and advanced obfuscation techniques complicates detection and incident response efforts, increasing dwell time and potential damage. Additionally, the malware’s modular builder tools lower the barrier for customization and deployment, potentially expanding the threat’s reach. While no active exploits have been reported, the presence of detailed intelligence and tooling in public repositories suggests a risk of future campaigns leveraging these capabilities. European entities must be vigilant against targeted phishing or spear-phishing campaigns, as the malware’s initial infection vector is associated with the ClickFix campaign, which likely involves social engineering.

Mitigation Recommendations

To mitigate the threat posed by the Pure malware ecosystem, European organizations should implement targeted and advanced defensive measures beyond standard best practices. These include: 1) Deploying endpoint detection and response (EDR) solutions capable of identifying Rust-based loaders and unusual process injection behaviors; 2) Monitoring network traffic for anomalies consistent with Sliver C2 communications, including uncommon protocols or encrypted outbound connections to suspicious domains; 3) Implementing strict application whitelisting and code signing policies to prevent unauthorized execution of builder-generated payloads; 4) Conducting regular threat hunting exercises focused on MITRE ATT&CK techniques associated with Pure malware, such as credential dumping (T1003), persistence (T1547), and process injection (T1055); 5) Enhancing phishing awareness training tailored to the ClickFix campaign’s social engineering tactics; 6) Restricting administrative privileges and employing multi-factor authentication to limit lateral movement and credential abuse; 7) Utilizing threat intelligence feeds to update detection rules with indicators of compromise (IOCs) related to PureCoder’s tools and infrastructure; 8) Reviewing and hardening GitHub and other developer platform monitoring to detect potential leakages or tool updates; and 9) Establishing incident response playbooks specific to RAT infections and C2 framework intrusions to reduce response times and impact.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://research.checkpoint.com/2025/under-the-pure-curtain-from-rat-to-builder-to-coder"]
Adversary
PureCoder
Pulse Id
68c9d89fdb056290ee763876
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash0bb01a45f259d2b5656f702c2cd04057
hash15c1981ffdccd14f14cc6441e9154956
hash2fe966894cecedff428b210d2a4cd0ed
hash6e8ba8f7f8da138bb05124667a03a268
hashc4a6e5a66a77a0b11c04c740c6fc6f77
hashf3992c270d76a66ea540f25d716f66a7
hash03d1d4a02fbd4c72b8ea9826a219a0511a62a974
hash11e0357a36bd6e908cf9f6e7834cc201a70d692a
hash17e14b3ccf309fd9b5f7a5068a5ceddd15fdea0f
hash2e5050c50d3a8e9f376f0ae9394cf265ed3dcf06
hash34ec79ab8a00dc6908874cdf7762756a2dca4274
hash39d3b6bee5450d82d096ad7bdf4244fcb7b1eb81
hash44ceaa27e81a9a9f218fff2c720b72390ff1c6c3
hash4b0fa1d022d409825bb2a872e245ebc9b2bcaff2
hash4cf36f75defc34cbd1b50c23e932f8d9a87dca9b
hash564db1627658feb61fe87b07659d371c371a4a41
hash647343bed2af6e8c16f296d626d98cdfd0f84cf0
hash7075fb417919b4ae9335ee7abeb9553953c8aac8
hash795fba180464a965f99fc2a50c5a3fad38a6939a
hash7b133998e526b3bee151329171c82ca1837c86f9
hash7f851ca85ec9136486692f283ff16c79a1a211ca
hash831bcb77a070b342115c68ced7cb22c0c778006f
hash85513077aadbe50fe68055f0420da2e6b97bd30d
hash85e444601df3b756209667504c39116a60e0e3d3
hash8c302d85720b3fa2a8ecceffe1aa7cd23efbe9b5
hash98ac16ba3e512e495ebf8da7e1ea6bea904ea69b
hash99cbbe5f68d50b79af8fb748f51794de137f4fe4
hashb8c385aa07aba1344cccfd92fcda2db9dbda9855
hashd340b780194d44ee9b8d32f596b5a13723abbe1d
hashd4fff01e37aff04bf8d4314833c8a5ab9e23aca7
hashe3a79ce291546191a5ddb039b2f9bf523bb9c4fb
hashf388ef87fcd48a2fe00fa449c1987115e5fe35c8
hash07a81384135c5803b96a4d15901927c247ec966cfc45792ddf3e25ba47038461
hash0f8a8342841ea814cda72369e1b48284d469c98f7d743f446e8ce81b37e961ff
hash1c85ecffd0e3da36a4bc154bf20b9243590eab3efa2bc7ac756ec8d33ff2767a
hash4a01d45563d802fee5593a21f1b216aeed83c4dff50fa6a31391ff73feb29dbd
hash8721b9b49b44b3f034d1d2f609d52f1fc09475d1cc6ced4f4e8f521c1d84f33f
hashae71480c394f24e1c0f4384ad417cc2749d8914f693ad34b9df5136f8799c19b
hashaec367496ba29710f16691333a2bb992122b6daf832689c1b8f843d89d9b3b62
hashbf83184822bf184536b50dff4758edd638b59cb82a06ee019b62b0bce33d07b5
hashf582cc1d41671abbd3ec37deb6eafb78d5365867df0948a288f34fcf1d8f9a08

Domain

ValueDescriptionCopy
domaindndhub.xyz
domaindsgnfwd.xyz
domainmktblend.monster
domainstategiq.quest
domainstathub.quest

Threat ID: 68ca9a856f90669b55758ca4

Added to database: 9/17/2025, 11:24:53 AM

Last enriched: 9/17/2025, 11:25:15 AM

Last updated: 9/19/2025, 3:22:48 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats