PureHVNC RAT unter Verwendung gefälschter hochrangiger Stellenangebote von Mode- und Schönheitsmarken

May 28, 2025

Summary

Key findings

Details

Snippet of the PS1 script inside the LNK file
Decoded PS1 script
Decoded PS1 script after the string replacement
Random content in the fake MP4 file
JS code inside the fake MP4
Second JS script
Third script
Lure example for a Bershka Marketing position
Lure example for a Fragrance Du Bois marketing position
DIE overview of the AutoIt file
AutoIt script snippet example
PS1 snippet created by the AutoIt script
Example of the AutoIt script obfuscated with CypherIT
Files to be created in the WordGenius Technologies folder
Example of the internet shortcut file
Example of the JS file being executed in the startup
Example of the process being created in suspended state
Example of the payload being written to the suspended process
Example of the main function of the .NET loader
Example of the .NET loader decryption function
PureHVNC encoded configuration
PureHVNC decoded configuration
Campaign IDC2 address
phom085.192.48.3
boom085.192.48.3
lu:139.99.188.124
cuoi085.192.48.3
Spam Mail0139.99.188.124
boom:139.99.188.124
lu085.192.48.3

Conclusions

IOCs

author image

Leandro Fróes

Leandro Fróes is a Senior Threat Research Engineer at Netskope, where he focuses on malware research, reverse engineering, automation and product improvement.
Leandro Fróes is a Senior Threat Research Engineer at Netskope, where he focuses on malware research, reverse engineering, automation and product improvement.
Keep a close eye on The Lens