PureHVNC RAT Developers Exploit GitHub to Spread Pure Malware Source Code

PureHVNC RAT Developers Exploit GitHub to Spread Pure Malware Source Code

The developers behind the PureHVNC remote access trojan (RAT) have been uncovered using GitHub repositories to host critical components and plugin source code for their Pure malware family.

Check Point Research’s recent forensic analysis of an eight-day ClickFix intrusion campaign reveals that PureHVNC’s command-and-control (C&C) server delivered GitHub URLs to infected machines, a practice previously unseen in high-confidence attribution for this threat actor.

By mapping these repositories to accounts operated by the malware author known as PureCoder, investigators have gained rare insights into the malware ecosystem, developer practices, and potential geographic footprint of this sophisticated operation.

During a mid-2025 incident response engagement, Check Point’s team traced a phishing campaign employing the ClickFix social engineering technique, wherein victims were fooled into executing a PowerShell payload by visiting a fake job listing.

This initial loader, written in Rust, installed PureHVNC RAT with campaign identifiers “2a” and “amazon3.”

During the eight-day intrusion, the attacker used malicious JavaScript files, deployed two instances of PureHVNC RAT, established persistence on the victim’s system, and finally executed the Sliver Command and Control (C2) framework.

Infection Chain.

The RAT maintained persistence via scheduled tasks and used SSL-secured communications to exfiltrate system information—including installed antivirus products, user privileges, OS details, and idle time—in compressed, chunked payloads of up to 16 KB.

Investigators extracted PureHVNC’s full command set, configuration schema, and plugin mechanism, noting the malware’s use of registry-stored, compressed plugin data that is dynamically reversed and decompressed at runtime.

Analysis of this builder revealed enums for PureCrypter integration, demonstrating how customers could select encryption options, persistence methods, and code injection techniques.

This integrated toolkit underscores the modular design philosophy of the Pure malware suite, enabling threat actors to tailor deployments for diverse objectives.

A pivotal finding emerged when the RAT contacted its C&C and downloaded three distinct GitHub URLs. Initial assumptions posited that these accounts belonged to customers distributing additional payloads.

By doing so, the malware disables AMSI’s runtime scanning capabilities, thereby evading detection and analysis by security products that rely on AMSI for real-time malware inspection.

 LdrLoadDll Hooked function.
 LdrLoadDll Hooked function.

However, reverse engineering of the PureRAT administration-builder uncovered that these hardcoded URLs are an intrinsic part of the builder itself.

This discovery directly links the GitHub accounts—one named testdemo345 and another labeled DFfe9ewf/PURE-CODER-1—to PureCoder, rather than to intermediary operators or crimeware customers.

The repositories house executable modules and plugin source files for TwitchBot and YoutubeBot extensions, which enable followers, likes, and ad-click operations on streaming platforms.

Metadata from Git commits indicates timestamps corresponding to UTC+0300, suggesting that PureCoder operates within this timezone, potentially placing them in Eastern Europe or Western Asia.

As the last step, the Rust Loader creates a heap, copies the decrypted payload buffer into it, and executes the shellcode.

 Shellcode NOP and CALL instruction.
 Shellcode NOP and CALL instruction.

Although exact attribution remains challenging, these indicators equip law enforcement and threat intelligence teams with actionable leads for further investigation.

Implications and Future Outlook

The revelation that PureHVNC and related malware components are hosted in plain sight on a mainstream development platform challenges conventional threat actor tradecraft.

Check Point further identified a PureRAT builder and administration console supporting multiple languages (English, Russian, and Chinese).

PureRAT Administration-Builder Panel.
PureRAT Administration-Builder Panel.

Hosting modules on GitHub offers high availability and redundancy, simplifies version control for developers, and evades basic network filtering by leveraging legitimate HTTPS traffic.

However, this practice also introduces a traceable footprint; investigators can monitor repository creation, commit patterns, and account activity to anticipate future updates or identify associated projects.

Organizations should prioritize monitoring network logs for anomalous GitHub API calls and unusual repository clones originating from endpoints.

Endpoint detection tools should flag scheduled tasks referencing GitHub downloads, especially when combined with encrypted SSL streams to non-standard ports.

Proactive threat hunting exercises focusing on emerging PureCrypter and PureLogs variants may uncover early indicators of compromise in environments targeted by PureRAT campaigns.

As the Pure malware family evolves, its developers are likely to diversify hosting solutions—potentially migrating to alternative code-sharing platforms or embedding payloads directly within the builder interface.

Security teams must therefore adopt adaptive detection strategies that blend signature-based controls with behavior-based analytics.

By understanding the developer’s operational practices and infrastructure preferences, defenders can gain strategic advantage over this adaptable and increasingly prevalent threat actor.

Indicators of Compromise

Here is the information in table format:

Description Value
JavaScript File 85513077AADBE50FE68055F0420DA2E6B97BD30D
JavaScript C&Cs stathub[.]quest, stategiq[.]quest, mktblend[.]monster, dsgnfwd[.]xyz, dndhub[.]xyz
First PureHVNC RAT E3A79CE291546191A5DDB039B2F9BF523BB9C4FB
Inno Setup Second PureHVNC RAT D340B780194D44EE9B8D32F596B5A13723ABBE1D
Rust Loader 99CBBE5F68D50B79AF8FB748F51794DE137F4FE4
PureHVNC 34EC79AB8A00DC6908874CDF7762756A2DCA4274
PureHVNC C&C 54.197.141[.]245
GitHub account hxxps://github[.]com/DFfe9ewf
GitHub – chromedriver.exe 2E5050C50D3A8E9F376F0AE9394CF265ED3DCF06
GitHub – msedgedriver.exe 7B133998E526B3BEE151329171C82CA1837C86F9
GitHub – WebDriver.dll 39D3B6BEE5450D82D096AD7BDF4244FCB7B1EB81
PureRAT Builder 17E14B3CCF309FD9B5F7A5068A5CEDDD15FDEA0F

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.