Posted in

PureLog Stealer Malware Delivered via Copyright-Themed Emails

Threat actors are increasingly using copyright-themed phishing emails to deliver sophisticated credential-stealing malware. The latest campaign distributing PureLog Stealer demonstrates how attackers combine fileless execution, encrypted payloads, and multi-stage loaders to bypass traditional security controls. 📧⚠️

This campaign specifically targets critical infrastructure sectors, including healthcare, government, hospitality, and education, across multiple countries. By leveraging malvertising, dynamic key retrieval, and in-memory execution, attackers can steal browser credentials, cryptocurrency wallets, and system intelligence while remaining largely invisible to endpoint defenses.

In this article, you’ll learn:

  • What PureLog Stealer is
  • How the multi-stage attack chain works
  • Evasion and persistence techniques
  • Indicators of compromise (IOCs)
  • Detection and mitigation strategies
  • Security best practices

What Is PureLog Stealer?

PureLog Stealer is an advanced information-stealing malware designed to harvest sensitive data from compromised systems. It uses fileless techniques and encrypted payload delivery to evade detection.

Key Capabilities

  • Browser credential theft
  • Cryptocurrency wallet extraction
  • System fingerprinting
  • Screenshot capture
  • Persistence via registry keys
  • In-memory execution
  • AMSI bypass
  • HTTPS data exfiltration

Key Takeaway:

PureLog Stealer prioritizes stealth, persistence, and credential harvesting.


Initial Access: Copyright-Themed Phishing Emails

The infection chain begins with localized copyright violation notifications designed to create urgency and fear.

Common Delivery Methods

  • Phishing emails with legal language
  • Malicious executable downloads
  • Google Ads malvertising campaigns
  • Fake legal documentation attachments

Social Engineering Technique

  • Victim receives copyright violation notice
  • Opens attachment or executes file
  • Decoy PDF displayed to reduce suspicion
  • Malware silently begins background activity

Security Insight:

Displaying a decoy document increases user trust during execution.


Multi-Stage Infection Chain Explained

The attack uses a multi-layered loader architecture to evade analysis.

Attack Workflow

  1. Victim executes malicious file
  2. Decoy PDF opens
  3. Encrypted archive downloaded (.pdf extension)
  4. Password fetched dynamically from C2
  5. Renamed WinRAR extracts archive
  6. Python executable disguised as svchost.exe runs
  7. Obfuscated Python script executes
  8. AMSI bypass applied
  9. Persistence established
  10. PureLog Stealer loaded in memory

Threat Insight:

Dynamic password retrieval prevents automated sandbox analysis.


Fileless Execution and Evasion Techniques

PureLog Stealer relies heavily on in-memory execution to bypass endpoint detection.

Evasion Techniques Used

  • AMSI patching in memory
  • XOR encryption
  • TripleDES encryption
  • GZip compressed payload
  • Reflective .NET loading
  • Fileless execution
  • Obfuscated Python loader
  • Renamed legitimate utilities

Risk Impact:

Traditional antivirus relying on file-based detection may fail.


AMSI Bypass Mechanism

The Python loader patches the Windows Antimalware Scan Interface (AMSI) to disable scanning.

AMSI Bypass Effects

  • Prevents script scanning
  • Disables antivirus inspection
  • Allows obfuscated payload execution
  • Improves persistence success rate

Security Reality:

AMSI bypass is increasingly common in modern malware campaigns.


Persistence Mechanism

The malware ensures persistence using Windows Registry Run Keys.

Persistence Behavior

  • Modifies registry entries
  • Mimics legitimate system settings
  • Executes on reboot
  • Maintains stealth presence

Data Collection and Fingerprinting

Before deploying the final payload, attackers gather system intelligence.

Data Collected

  • OS version
  • Installed security software
  • Desktop screenshot
  • System configuration
  • Network details

This intelligence helps attackers optimize payload delivery.


In-Memory Execution of PureLog Stealer

The final stage uses dual .NET loaders for redundancy.

Execution Process

  • Python script loads XOR-encrypted loaders
  • Loaders decrypt TripleDES assembly
  • GZip payload decompressed
  • PureLog Stealer loaded reflectively
  • Execution occurs in managed heap

Key Advantage:

No malicious files are written to disk.


Targeted Industries

Telemetry indicates highly targeted attacks rather than mass distribution.

Targeted Sectors

  • Healthcare
  • Government
  • Hospitality
  • Education

Targeted Countries

  • United States
  • Germany
  • Canada
  • Australia

Threat Intelligence Insight:

Critical infrastructure is a primary focus.


Indicators of Compromise (IOCs)

Indicator TypeValueContext
IP Address166[.]0[.]184[.]127C2 Server
IP Address64[.]40[.]154[.]96Outbound infrastructure
Domainquickdocshare[.]comPayload hosting
Domainlogs[.]bestshopingday[.]comC2 infrastructure
Fileinstructions.pdfPython loader
Filesvchost.exeRenamed Python executable
FileDgrfauysx.exe.NET loader
FileFsywsuac.exeSecondary loader

Common Warning Signs

Red Flags

  • Unexpected copyright violation emails
  • Executables disguised as documents
  • Files using incorrect extensions
  • Suspicious registry modifications
  • Unusual outbound HTTPS traffic
  • AMSI memory tampering

Detection Strategies

Security Monitoring Recommendations

  • Monitor AMSI bypass attempts
  • Detect suspicious Python execution
  • Track registry persistence changes
  • Identify reflective .NET loading
  • Analyze outbound encrypted traffic
  • Behavioral anomaly detection

Mitigation Best Practices

For Security Teams

  • Enable EDR behavioral detection
  • Block execution from temp directories
  • Monitor PowerShell and Python activity
  • Implement application allowlisting
  • Inspect outbound HTTPS traffic
  • Deploy sandbox detonation

For Organizations

  • Conduct phishing awareness training
  • Disable unnecessary scripting engines
  • Patch Windows systems regularly
  • Restrict user privileges
  • Implement Zero Trust access

Framework Mapping

MITRE ATT&CK Techniques

  • T1566 – Phishing
  • T1059 – Command and scripting interpreter
  • T1027 – Obfuscated files
  • T1620 – Reflective loading
  • T1112 – Registry modification
  • T1055 – Process injection

NIST Cybersecurity Framework

  • Identify: Email threat risk
  • Protect: User awareness
  • Detect: EDR monitoring
  • Respond: Malware containment
  • Recover: Credential rotation

Risk Impact Analysis

Risk AreaImpact
CredentialsBrowser password theft
CryptoWallet compromise
EnterpriseData exfiltration
ComplianceRegulatory exposure
OperationsSystem persistence
SecurityDefense evasion

FAQs

What is PureLog Stealer?

PureLog Stealer is an information-stealing malware that harvests credentials and executes filelessly in memory.

How does the attack begin?

It starts with copyright-themed phishing emails or malvertising downloads.

Why is fileless execution dangerous?

It avoids writing files to disk, bypassing traditional antivirus detection.

What data does PureLog steal?

Browser credentials, crypto wallets, system information, and screenshots.

Who is targeted?

Healthcare, government, education, and hospitality sectors.

How can organizations defend against it?

Use EDR, behavioral detection, phishing awareness, and application control.


Conclusion

The PureLog Stealer campaign highlights how modern threat actors combine social engineering, fileless malware, and encrypted payloads to bypass security defenses. By using copyright-themed phishing emails and in-memory execution, attackers can silently harvest credentials from high-value targets.

Organizations must:

  • Strengthen email security
  • Deploy behavioral detection tools
  • Monitor scripting activity
  • Educate users on phishing risks

Proactive detection and layered security controls are essential to stop advanced credential-stealing campaigns. 🔐

Leave a Reply

Your email address will not be published. Required fields are marked *