๐Ÿšจ Update Your Detection Rules: New In-Memory Loader

We caught a highly evasive #HanGhost loader, designed to bypass traditional detection through layered obfuscation and in-memory execution. This activity targets corporate users handling payments, logistics, and contract workflows, expanding exposure across critical operations.

โš ๏ธ The delivery chain combines obfuscated JavaScript, hidden PowerShell execution, and environment-variable staging.

In the second stage, the loader retrieves an image file and extracts an encrypted payload embedded at the end of the file, combining steganography with in-memory loading and making detection significantly harder โ—๏ธ

๐Ÿ‘พ The loader is used to deliver multiple malware families: #PureHVNC, #XWorm, #Meduza, #AgentTesla, and #Phantom, with some chains also deploying #UltraVNC, extending the impact from initial access to persistent remote control.

โšก๏ธ#ANYRUN Sandbox allows analysts to reconstruct the full execution chain, helping confirm complex multi-stage activity earlier and reduce MTTR.

๐Ÿ”— JavaScript-to-Payload execution chain:

JS โžก๏ธ PowerShell โžก๏ธ in-memory .NET assembly โžก๏ธ PNG payload โžก๏ธ Malware

๐Ÿ“ˆ The campaign shows wave-based activity, indicating ongoing development and scaling:

March 26 โ€” early cluster

April 1โ€“2 โ€” first large multi-family wave

April 3 โ€” focused wave (PureHVNC / AgentTesla / Phantom)

April 6 โ€” PureHVNC-heavy activity

April 7 โ€” new peak with split between PureHVNC and XWorm/Meduza clusters

April 8 โ€” multi-family wave (PureHVNC / Phantom / AgentTesla)

April 9โ€“13 โ€” more focused wave dominated by PureHVNC, with Phantom, DarkCloud, Formbook, and Meduza also present

๐Ÿ‘จโ€๐Ÿ’ป See the analysis session and collect #IOCs to speed up detection and response: https://app.any.run/tasks/cc26155e-e8e9-442b-b000-8d1a1435e7db?utm_source=mastodon&utm_medium=post&utm_campaign=hanghost&utm_content=linktoservice&utm_term=130426

๐Ÿ” Use this TI Lookup query to pivot from IOCs, review related activity, and validate your detection coverage: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=hanghost&utm_content=linktotilookup&utm_term=130426#%7B%2522query%2522:%2522commandLine:%255C%2522bYPaSS%2520-Command%2520*iex%2520$env:%255C%2522%2522,%2522dateRange%2522:180%7D%20

๐Ÿ‘จโ€๐Ÿ’ป Equip your SOC with faster decisions and lower workload. See how #ANYRUN fits your workflows: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=hanghost&utm_content=linktoenterprise&utm_term=130426

#cybersecurity #infosec

#xworm #asyncrat #purehvnc at:

https:// locale-respondent-realtor-excellent.trycloudflare\.com

๐Ÿ‘พ #UpCrypter is one of the fastest growing cyber threats of 2025.

This loader spreads via #phishing as a JS file and delivers malware like #DCRat & #PureHVNC to infected systems.

Discover its attack chain in our analysis: https://any.run/malware-trends/upcrypter/?utm_source=mastodon&utm_medium=post&utm_campaign=upcrypter&utm_content=linktomtt&utm_term=141025

Guess we're back to these...:
http://episode-windsor-subdivision-delivery.trycloudflare\.com
https://lol-julian-impossible-bermuda.trycloudflare\.com
https://italia-committees-practical-violence.trycloudflare\.com

#asyncrat #purehvnc #quasarrat

jskeywon.duckdns\.org
jbsak.duckdns\.org
jul5050quasae.duckdns\.org
ksj43ts.duckdns\.org

PureRAT is the exact same malware as what Morphisec and others call #ResolverRAT. #PureHVNC, on the other hand, is the predecessor to #PureRAT.

IOCs:
๐Ÿ‘พ 193.26.115.125:8883
๐Ÿ‘พ purebase.ddns[.]net:8883
๐Ÿ‘พ 45.74.10.38:56001
๐Ÿ‘พ 139.99.83.25:56001
https://netresec.com/?b=2589522

PureRAT = ResolverRAT = PureHVNC

PureRAT is a Remote Access Trojan, which can be used by an attacker to remotely control someone else's PC. PureRAT provides the following features to an attacker: See the victims user interfaceInteract with the victim PC using mouse and keyboardView the webcamListen to the microphoneRecord keystroke[...]

Netresec