PULSE NAME
IOC - PureRAT: A Multi-Stage, Fileless RAT Utilizing Image Steganography and Process Hollowing
WHITE celestre 2026-04-23 Modified: 2026-04-23
12
IOCs
MEDIUM VOLUME
PureRAT is an advanced remote access trojan (RAT) characterized by its complex infection stages. The intrusion sequence is initiated by a malicious .LNK file that triggers a concealed PowerShell command to retrieve a heavily obfuscated VBS loader. This loader facilitates fileless payload delivery and secures its foothold on the system by leveraging the Task Scheduler to establish persistence. A critical component of this process is the use of steganography, where malicious portable executable (PE) files are concealed within legitimate-looking PNG images. To ensure successful execution and evade security measures, the malware employs advanced tactics, including a user account control (UAC) bypass via cmstp.exe and process hollowing into the legitimate Msbuild.exe binary. Furthermore, the malware conducts environment checks for VMware and QEMU to detect virtual analysis environments.
Indicators of Compromise (12)
All URL IPv4 FileHash-SHA256 domain hostname
TYPEINDICATORDESCRIPTIONCREATED
URL https://crixup.com 2026-04-23
IPv4 178.16.52.58 CC=DE ASN=AS40999 dus.net gmbh 2026-04-23
FileHash-SHA256 121ae6c664aaef9ed2e44ed04c66e1cabcb00295c48289afd9e23126fc6edadf 2026-04-23
FileHash-SHA256 40bd37eba7f9a56516c96092d5c6d50937fc4df00baf79155ada9d1673389830 2026-04-23
FileHash-SHA256 7d22c61e8aafc9a2a812cafe7720922ab12d770e5af7d92527d9b0dbd6e10f30 2026-04-23
FileHash-SHA256 96b4713c6b9e5283f9d2f570a51edce66fc44ced2ae130b65dbe1326690a27eb 2026-04-23
FileHash-SHA256 96d4e77c0d433b14c2030be194ad12e159b5292f33da3a7d4d2749475845c253 2026-04-23
FileHash-SHA256 bb1075ca2ff0a9b5e407fb396f8f87705d8f512b42b3f4326586ef17fed8aabb 2026-04-23
FileHash-SHA256 e0c0418d8bad7b4731b7de35059c6a51c49825e6ec841193cd8842220957cff9 2026-04-23
URL http://instantservices1.ddnsguru.com 2026-04-23
domain crixup.com 2026-04-23
hostname instantservices1.ddnsguru.com 2026-04-23