A brand new and extremely evasive malware marketing campaign delivering the PureHVNC Distant Entry Trojan (RAT) has been recognized by Netskope Risk Labs, showcasing a fancy multi-layer an infection chain designed to bypass trendy safety defenses.
This marketing campaign, lively in 2024, leverages faux job presents from well-known international manufacturers like Bershka, Perfume Du Bois, John Hardy, and Pricey Klairs to lure victims, focusing on people in search of high-profile advertising and marketing roles within the magnificence and vogue industries.
Subtle Multi-Layer An infection Chain
The usage of such tailor-made social engineering ways, mixed with superior technical evasion strategies, underscores the sophistication of this menace, which grants attackers full system entry to deploy extra malware and instruments.
The an infection begins with the obtain of a malicious LNK file disguised as a authentic doc, typically bearing twin extensions like “.pdf.lnk” to mislead customers into believing it’s a innocent PDF.

Upon execution, the LNK file triggers a PowerShell command that decodes a base64-encoded script, initiating a multi-stage course of involving PowerShell, JavaScript, AutoIt scripts, and obfuscated payloads.
This chain consists of downloading a big faux MP4 file laced with malicious JavaScript hidden inside HTML tags, which additional decodes and executes extra scripts to retrieve and run a conveyable executable (PE) file named “phom.exe.”
Technical Evasion Ways
A decoy PDF resembling a job provide is concurrently displayed to keep up the ruse, whereas behind the scenes, an AutoIt-compiled binary deploys additional scripts, creates persistence through an web shortcut within the Home windows Startup folder, and makes use of course of hollowing to inject a .NET payload into authentic processes like jsc.exe or AppLaunch.exe.
This payload, encrypted with AES-256 in CBC mode and obfuscated with .NET Reactor, finally masses the PureHVNC RAT, with configurations revealing a number of marketing campaign IDs and related command-and-control (C2) servers corresponding to 85.192.48.3 and 139.99.188.124.
The marketing campaign employs in depth obfuscation at each stage, utilizing instruments like CypherIT crypter for AutoIt scripts and embedding junk knowledge to evade detection.

Anti-analysis checks are additionally in place, terminating execution if frequent antivirus emulator names or processes like AvastUI.exe are detected.
Persistence is achieved by means of information dropped in a “WordGenius Applied sciences” folder in %LocalAppData%, with dynamic naming conventions to additional keep away from detection.
The technical intricacy of this assault, from string substitute in scripts to leveraging native Home windows instruments like mshta.exe for distant file execution, highlights its intent to sidestep conventional safety measures.
Netskope Risk Labs notes that whereas the precise preliminary vector stays unclear, e-mail supply is strongly suspected primarily based on malware configurations and lures like copyright infringement notices alongside job presents.
As PureHVNC continues to evolve with new supply strategies, together with Python chains and genAI web site lures noticed in 2024, ongoing vigilance and superior menace detection are essential to counter its subtle ways, which pose a major threat to people and organizations alike by enabling unauthorized entry and potential additional exploitation.
Discover this Information Fascinating! Observe us on Google Information, LinkedIn, & X to Get Immediate Updates!