CRIL has recognized a commodity loader being leveraged by numerous risk actors in focused e mail campaigns.
Government Abstract
CRIL (Cyble Analysis and Intelligence Labs) has been monitoring a classy commodity loader utilized by a number of high-capability risk actors. The marketing campaign demonstrates a excessive diploma of regional and sectoral specificity, primarily focusing on Manufacturing and Authorities organizations throughout Italy, Finland, and Saudi Arabia.
This marketing campaign makes use of superior tradecraft, using a various array of an infection vectors together with weaponized Workplace paperwork (exploiting CVE-2017-11882), malicious SVG recordsdata, and ZIP archives containing LNK shortcuts. Regardless of the number of supply strategies, all vectors leverage a unified commodity loader.
The operation’s sophistication is additional evidenced by means of steganography and the trojanization of open-source libraries. Including their stealth is a custom-engineered, four-stage evasion pipeline designed to reduce their forensic footprint.
By masquerading as authentic Buy Order communications, these phishing assaults in the end ship Distant Entry Trojans (RATs) and Infostealers.
Our analysis confirms that equivalent loader artifacts and execution patterns hyperlink this marketing campaign to a broader infrastructure shared throughout a number of risk actors.
Key Takeaways
- Precision Focusing on & Geographic Scope: The marketing campaign particularly targets the Manufacturing and Industrial sectors throughout Europe and the Center East. The first goal is the exfiltration of delicate industrial information and the compromise of high-value administrative credentials.
- Versatile Malware Distribution: The loaders function a multi-functional distribution platform. They’ve been noticed delivering quite a lot of RATs (and knowledge stealers, equivalent to PureLog Stealer, Katz Stealer, DC Rat, Async Rat, and Remcos). This means the loader is probably going shared or bought throughout completely different risk actor teams.
- Steganography & Infrastructure Abuse: To bypass conventional community safety, the risk actors hosted picture recordsdata on authentic supply platforms. These photos comprise steganographically embedded payloads, permitting the malicious code to slide previous file-based detection techniques by masquerading as benign site visitors
- Trojanization of Open-Supply Libraries: The actors make the most of a classy “hybrid meeting” method. By appending malicious features to trusted open-source libraries and recompiling them, the ensuing recordsdata retain their genuine look and performance, making signature-based detection extraordinarily tough.
- 4-Stage Evasion Pipeline: The an infection chain is engineered to reduce forensic footprint. It employs a high-velocity, four-stage course of:
- Script Obfuscation: To cover preliminary intent.
-
- Steganographic Extraction: To tug the payload from photos.
-
- Reflective Loading: To run code instantly in reminiscence with out touching the disk.
-
- Course of Injection: To cover malicious exercise inside authentic system processes.
- Novel UAC Bypass Discovery: A singular Person Account Management (UAC) bypass was recognized in a latest pattern. The malware monitored system course of creation occasions and opportunistically triggered UAC prompts throughout authentic launches, tricking the system or person into granting elevated privileges below the guise of a routine operation.
Technical Evaluation
To exhibit the execution movement of this marketing campaign, we analyzed the pattern with the next SHA256 hash: c1322b21eb3f300a7ab0f435d6bcf6941fd0fbd58b02f7af797af464c920040a.
Preliminary An infection vector
The marketing campaign begins with focused phishing emails despatched to manufacturing organizations, masquerading as authentic Buy Order communications from enterprise companions (see Determine 2).

Extraction of the RAR archive reveals a first-stage malicious JavaScript payload, PO No 602450.js, masquerading as a authentic buy order doc.
Stage 1: JavaScript and PowerShell execution
The JavaScript file accommodates closely obfuscated code with particular characters which are stripped at runtime. The first obfuscation strategies contain break up and be part of operations used to dynamically reconstruct malicious strings (see Determine 3).

The de-obfuscated JavaScript creates a hidden PowerShell course of utilizing WMI objects (winmgmts:rootcimv2). It employs a number of obfuscation layers, together with base64 encoding and string manipulation, to evade detection, with a 5-second sleep delay (see Determine 4).

Stage 2: Steganographic payload retrieval
The decoded PowerShell script features as a second-stage loader, retrieving a malicious PNG file from Archive.org. This picture file accommodates a steganographically embedded base64-encoded .NET meeting hidden on the finish of the file (see Determine 5).

Upon retrieval, the PowerShell script employs common expression (regex) sample matching to extract the malicious payload utilizing particular delimiters (“BaseStart-‘+’-BaseEnd”). The extracted meeting is then mirrored in reminiscence through Reflection.Meeting::Load, invoking the “classlibrary1” namespace with the category title “class1” technique “VAI”
This fileless execution method ensures the ultimate payload executes with out writing to disk, considerably decreasing detection chance and complicating forensic evaluation (see Determine 6).

Stage 3: Weaponized TaskScheduler loader
The reflectively loaded .NET meeting serves because the third-stage loader, weaponizing the authentic open-source TaskScheduler library from GitHub. The risk actors appended malicious features to the unique library supply code and recompiled it, making a trojanized meeting that retains all authentic performance whereas embedding malicious capabilities (see Determine 7).

Upon execution, the malicious technique receives the payload URL in reverse and base64-encoded format, together with DLL path, DLL title, and CLR path parameters (see Determine 8).

Stage 4: Course of injection and payload execution
The weaponized loader creates a brand new suspended RegAsm.exe course of and injects the decoded payload into its reminiscence area earlier than executing it (see Determine 9). This course of hollowing method permits the malware to masquerade as a authentic Home windows utility whereas executing malicious code.

The loader downloads extra content material that’s equally reversed and base64-encoded. After downloading, the loader reverses the content material, performs base64 decoding, and runs the ensuing binary utilizing both RegAsm or AddInProcess32, injecting it into the goal course of.
Closing payload: PureLog Stealer
The injected payload is an executable file containing PureLog Stealer embedded inside its useful resource part. The stealer is extracted utilizing Triple DES decryption in CBC mode with PKCS7 padding, using the offered key and IV parameters. Following decryption, the info undergoes GZip decompression earlier than the ensuing payload, PureLog Stealer, is invoked (see Determine 10).

PureLog Stealer is an information-stealing malware designed to exfiltrate delicate information from compromised hosts, together with browser credentials, cryptocurrency pockets info, and complete system particulars. The risk actor’s command and management infrastructure operates at IP handle 38.49.210[.]241.
PureLog Stealer steals the next from the sufferer’s machines:
| Class | Focused Knowledge | Element |
| Internet Browsers | Chromium-based browsers | Knowledge harvested from a variety of Chromium-based browsers, together with steady, beta, developer, transportable, and privacy-focused variants. |
| Firefox-based browsers | Knowledge extracted from Firefox and Firefox-derived browsers | |
| Browser credentials | Saved usernames and passwords related to web sites and net purposes | |
| Browser cookies | Session cookies, authentication tokens, and protracted cookies | |
| Browser autofill information | Autofill profiles, saved cost info, and type information. | |
| Browser historical past | Searching historical past, visited URLs, obtain information, and go to metadata. | |
| Search queries | Saved browser search phrases and normalized key phrase information | |
| Browser tokens | Authentication tokens and related e mail identifiers | |
| Cryptocurrency Wallets | Desktop wallets | Pockets information from domestically put in cryptocurrency pockets purposes |
| Browser extension wallets | Pockets information from browser-based cryptocurrency extensions | |
| Pockets configuration | Encrypted seed phrases, personal keys, and pockets configuration recordsdata | |
| Password Managers | Browser-based managers | Credentials saved in browser-integrated password administration extensions |
| Standalone managers | Credentials and vault information from desktop password supervisor purposes | |
| Two-Issue Authentication | 2FA purposes | One-time password (OTP) secrets and techniques and configuration information from authenticator purposes |
| VPN Shoppers | VPN credentials | VPN configuration recordsdata, authentication tokens, and person credentials |
| Messaging Functions | Immediate messaging apps | Account tokens, person identifiers, messages, and configuration recordsdata |
| Gaming platforms | Authentication and account metadata associated to gaming providers | |
| FTP Shoppers | FTP credentials | Saved FTP server credentials and connection configurations |
| E mail Shoppers | Desktop e mail purchasers | E mail account credentials, server configurations, and authentication tokens |
| System Info | {Hardware} particulars | CPU, GPU, reminiscence, motherboard identifiers, and system serials |
| Working system | OS model, structure, and product identifiers | |
| Community info | Public IP handle and network-related metadata | |
| Safety software program | Put in safety and antivirus product particulars |
Tracing the Footprints: Shared Ecosystem
CRIL’s cross-campaign evaluation reveals a putting uniformity of tradecraft, uncovering a persistent architectural blueprint that serves as a standard thread. Regardless of the deployment of numerous malware payloads, the supply mechanism stays fixed.
This standardized methodology consists of using steganography to hide payloads inside benign picture recordsdata, the applying of string reversal mixed with Base64 encoding for deep obfuscation, and the supply of encoded payload URLs on to the loader. Moreover, the actors persistently abuse authentic .NET framework executables to facilitate superior course of hollowing strategies.
This commentary can be bolstered by analysis from Seqrite, Nextron Techniques, and Zscaler, which documented equivalent class naming conventions and execution patterns throughout quite a lot of malware households and operations.
The next code snippet illustrates the shared loader structure noticed throughout these campaigns (see Determine 11).

This consistency means that the loader is likely to be a part of a shared supply framework utilized by a number of risk actors.
UAC Bypass
Notably, a latest pattern revealed an LNK file using comparable obfuscation strategies, using PowerShell to obtain a VBS loader, together with an unusual UAC bypass technique. (see Determine 12)

An unusual UAC bypass method is employed in later levels of the assault, the place the malware screens course of creation occasions and triggers a UAC immediate when a brand new course of is launched, thereby enabling the execution of a PowerShell course of with elevated privileges after person approval (see Determine 13).

Conclusion
Our analysis has uncovered a hybrid risk with putting uniformity of tradecraft, uncovering a persistent architectural blueprint. This standardized methodology consists of using steganography to hide payloads inside benign picture recordsdata, the applying of string reversal mixed with Base64 encoding for deep obfuscation, and the supply of encoded payload URLs on to the loader. Moreover, the actors persistently abuse authentic .NET framework executables to facilitate superior course of hollowing strategies.
The truth that a number of malware households leverage these class naming conventions in addition to execution patterns throughout is additional testomony to how potent this risk is to the goal nations and sectors.
The invention of a novel UAC bypass confirms that this isn’t a static risk, however an evolving operation with a devoted growth cycle. Organizations, particularly within the focused areas, ought to deal with “benign” picture recordsdata and e mail attachments with heightened scrutiny.
Suggestions
Deploy Superior E mail Safety with Behavioral Evaluation
Implement e mail safety options with attachment sandboxing and behavioral evaluation capabilities that may detect obfuscated JavaScript, VBScript recordsdata, and malicious macros. Allow strict filtering for RAR/ZIP attachments and block execution of scripts from e mail sources to stop preliminary an infection vectors focusing on enterprise workflows.
Implement Software Whitelisting and Script Execution Controls
Deploy software whitelisting insurance policies to stop unauthorized JavaScript and VBScript execution from user-accessible directories. Allow PowerShell Constrained Language Mode and complete logging to detect suspicious script exercise, notably instructions trying to obtain distant content material or carry out reflective meeting loading. Prohibit the execution of authentic system binaries from non-standard areas to stop their abuse in living-off-the-land (LotL) assaults.
Deploy EDR Options with Superior Course of Monitoring
Implement Endpoint Detection and Response (EDR) options that may detect subtle evasion strategies and runtime anomalies, enabling efficient safety in opposition to superior threats. Configure EDR platforms to watch for course of hollowing actions the place authentic signed Home windows binaries are exploited to execute malicious payloads in reminiscence. Set up behavioral detection guidelines for fileless malware strategies, together with reflective meeting loading and suspicious parent-child course of relationships that deviate from regular system habits.
Monitor for Reminiscence-Based mostly Threats and Course of Anomalies
Set up behavioral detection guidelines for fileless malware strategies, together with reflective meeting loading, course of hollowing, and suspicious parent-child course of relationships. Deploy reminiscence evaluation instruments to establish code injection into authentic Home windows processes, equivalent to MSBuild.exe, RegAsm.exe, and AddInProcess32.exe, that are generally abused for malicious payload execution.
Strengthen Credential and Cryptocurrency Pockets Safety
Implement multi-factor authentication throughout all vital techniques and encourage customers to retailer cryptocurrency property in {hardware} wallets moderately than browser-based options. Implement monitoring for unauthorized entry to browser credential shops, password managers, and cryptocurrency pockets directories to detect potential information exfiltration makes an attempt.
Implement Steganography Detection and Picture Evaluation Capabilities
Deploy specialised steganography detection instruments that analyze picture recordsdata for hidden malicious payloads embedded inside pixel information or metadata. Implement statistical evaluation strategies to establish anomalies in picture file entropy and bit patterns which will point out the presence of hid executable code. Configure safety options to carry out deep inspection of picture codecs, notably PNG recordsdata, that are regularly exploited for embedding command-and-control infrastructure or malicious scripts in covert communication channels.
MITRE Techniques, Methods & Procedures
| Tactic | Method | Process |
| Preliminary Entry (TA0001) | Phishing: Spearphishing Attachment (T1566.001) | Phishing emails with malicious attachments masquerading as Buy Orders |
| Preliminary Entry (TA0001) | Exploit Public-Going through Software (T1190) | Exploitation of CVE-2017-11882 in Microsoft Equation Editor |
| Execution (TA0002) | Person Execution: Malicious File (T1204.002) | Person opens JavaScript, VBScript, or LNK recordsdata from archive attachments |
| Execution (TA0002) | Command and Scripting Interpreter: JavaScript (T1059.007) | Obfuscated JavaScript executes to obtain second-stage payloads |
| Execution (TA0002) | Command and Scripting Interpreter: PowerShell (T1059.001) | A hidden PowerShell occasion was spawned to retrieve steganographic payloads |
| Execution (TA0002) | Home windows Administration Instrumentation (T1047) | WMI used to spawn hidden PowerShell processes |
| Protection Evasion (TA0005) | Obfuscated Information or Info (T1027) | Multi-layer obfuscation utilizing base64 encoding and string manipulation |
| Protection Evasion (TA0005) | Steganography (T1027.003) | Malicious payload hidden inside PNG picture recordsdata |
| Protection Evasion (TA0005) | Reflective Code Loading (T1620) | The .NET meeting is reflectively loaded into reminiscence with out disk writes |
| Protection Evasion (TA0005) | Course of Injection: Course of Hollowing (T1055.012) | Payload injected into authentic Home windows system processes |
| Protection Evasion (TA0005) | Masquerading: Match Legit Title or Location (T1036.005) | Execution by authentic Home windows utilities for evasion |
| Protection Evasion (TA0005) | Abuse Elevation Management Mechanism: Bypass Person Account Management (T1548.002) | UAC bypass utilizing course of monitoring and a person approval immediate |
| Protection Evasion (TA0005) | Virtualization/Sandbox Evasion: Time-Based mostly Evasion (T1497.003) | 5-second sleep delay to evade automated sandbox evaluation |
| Credential Entry (TA0006) | Unsecured Credentials: Credentials In Information (T1552.001) | Extraction of credentials from browser databases and configuration recordsdata |
| Credential Entry (TA0006) | Credentials from Password Shops: Credentials from Internet Browsers (T1555.003) | Harvesting saved passwords and cookies from net browsers |
| Credential Entry (TA0006) | Credentials from Password Shops (T1555) | Extraction of credentials from password supervisor purposes |
| Discovery (TA0007) | System Info Discovery (T1082) | Assortment of {hardware}, OS, and community info |
| Discovery (TA0007) | Safety Software program Discovery (T1518.001) | Enumeration of put in antivirus merchandise |
| Assortment (TA0009) | Knowledge from Native System (T1005) | Assortment of cryptocurrency wallets, VPN configs, and e mail information |
| Assortment (TA0009) | E mail Assortment (T1114) | Harvesting e mail credentials and configurations from e mail purchasers |
| Command and Management (TA0011) | Internet Service (T1102) | Abuse of Archive.org for payload internet hosting |
| Exfiltration (TA0010) | Exfiltration Over C2 Channel (T1041) | Knowledge exfiltration to C2 server at 38.49.210.241 |
Indicators of Compromise (IOCs)
| Indicator | Sort | Feedback |
| 5c0e3209559f83788275b73ac3bcc61867ece6922afabe3ac672240c1c46b1d3 | SHA-256 | E mail |
| c1322b21eb3f300a7ab0f435d6bcf6941fd0fbd58b02f7af797af464c920040a | SHA-256 | PO No 602450.rar |
| 3dfa22389fe1a2e4628c2951f1756005a0b9effdab8de3b0f6bb36b764e2b84a | SHA-256 | Microsoft.Win32.TaskScheduler.dll |
| bb05f1ef4c86620c6b7e8b3596398b3b2789d8e3b48138e12a59b362549b799d | SHA-256 | PureLog Stealer |
| 0f1fdbc5adb37f1de0a586e9672a28a5d77f3ca4eff8e3dcf6392c5e4611f914 | SHA-256 | Zip file accommodates LNK |
| 917e5c0a8c95685dc88148d2e3262af6c00b96260e5d43fe158319de5f7c313e | SHA-256 | LNK File |
| hxxp://192[.]3.101[.]161/zeus/ConvertedFile[.]txt | URL | Base64 encoded payload |
| hxxps://pixeldrain[.]com/api/file/7B3Gowyz | URL | Base64 encoded payload |
| hxxp://dn710107.ca.archive[.]org/0/gadgets/msi-pro-with-b-64_20251208_1511/MSI_PRO_with_b64[.]png | URL | PNG file |
| hxxps://ia801706.us.archive[.]org/25/gadgets/msi-pro-with-b-64_20251208/MSI_PRO_with_b64[.]png | URL | PNG file |
| 38.49.210[.]241 | IP | Purelog Stealer C&C |
References:
https://www.seqrite.com/weblog/steganographic-campaign-distributing-malware
https://www.nextron-systems.com/2025/05/23/katz-stealer-threat-analysis/


