FortiGuard Labs uncovered a phishing campaign that delivers a TXZ archive, uses environment variables and a steganography loader named PawsRunner, and ultimately deploys the .NET infostealer PureLogs. The attack hides encrypted payloads inside PNG images, including cat photos, while PureLogs steals browser, wallet, and communication-app data before exfiltrating it over HTTPS. #PawsRunner #PureLogs #FortiGuardLabs #MicrosoftWindows
Keypoints
- FortiGuard Labs identified a phishing campaign targeting Microsoft Windows users with a TXZ archive attachment disguised as an invoice.
- The JavaScript inside the archive hides malicious commands in environment variables and launches hidden PowerShell and conhost.exe processes.
- PawsRunner acts as a steganography loader, using PNG images and hidden iTXt/IEND chunk data to retrieve the next-stage payload.
- The final payload is PureLogs, a .NET infostealer protected with .NET Reactor and configured through Protobuf serialization.
- PureLogs contacts its C2 server over HTTPS, checks connectivity, then downloads and loads the core DLL after AES decryption and gzip decompression.
- The malware steals data from a wide range of browsers, crypto wallets, browser extensions, Discord, Telegram, VPN tools, and file transfer applications.
- Fortinet notes detections, IPS coverage for PureLogs communications, and the ability to block the unusual TXZ attachment format.
MITRE Techniques
- [T1566.001] Phishing: Spearphishing Attachment â The campaign starts with a phishing email carrying a TXZ archive attachment used as the lure (âThe attack campaign begins with a phishing email containing an TXZ archiveâŚas an attachmentâ).
- [T1027] Obfuscated Files or Information â The JavaScript includes irrelevant multilingual comments and garbled environment variables to obscure intent (âcontains several functions, each preceded by irrelevant commentsâ and âdeclare a large number of Process environment variables containing garbled textâ).
- [T1059.001] Command and Scripting Interpreter: PowerShell â PowerShell is used to execute the hidden command and stage subsequent payload decoding (âinvoked PowerShell also uses the -w hidden flagâ).
- [T1564.003] Hide Artifacts: Hidden Window â The malware hides execution by launching conhost.exe headless and PowerShell with a hidden window (âlaunches conhost.exe in headless modeâ and âuses the -w hidden flag to hide the PowerShell windowâ).
- [T1027.003] Steganography â The loader extracts encrypted data hidden in PNG images using steganographic markers (âuses steganography to conceal data within the pictureâ and âuses âiTXtâ and âIENDâ chunks as markersâ).
- [T1140] Deobfuscate/Decode Files or Information â The payload is AES-decrypted, Gzip-decompressed, and Base64-decoded in multiple stages (âdecodes and decrypts its payload using the AES algorithmâ and âdecompresses it using the Gzip methodâ).
- [T1105] Ingress Tool Transfer â The loader downloads next-stage content from remote URLs and replaces the original link if needed (âretrieve dataâ, âdownloaded dataâ, and âfallback URLsâ).
- [T1129] Shared Modules â The malware loads native libraries and resolves API functions dynamically (âloads native libraries and resolves addresses for necessary API functionsâ).
- [T1055] Process Injection â The .NET assembly is loaded and executed dynamically in a fileless manner via reflection (âloaded and executed dynamically via reflection in a fileless mannerâ).
- [T1497.001] Virtualization/Sandbox Evasion: System Checks â The loader bypasses ETW and Windows 11 (24H2) security features before execution (âAfter bypassing ETW and Windows 11 (24H2) security featuresâ).
- [T1071.001] Application Layer Protocol: Web Protocols â C2 and data theft occur via HTTP/HTTPS requests to multiple endpoints (âuses HTTP requestsâ and âuses HTTPS for its Command and Control (C2) communicationsâ).
- [T1041] Exfiltration Over C2 Channel â Harvested data is sent back to the C2 server through HTTP requests (âexfiltrates it to the C2 server via HTTP requestsâ).
- [T1518.001] Software Discovery: Security Software Discovery â The malware checks or bypasses ETW and Windows 11 security features, indicating awareness of defensive tooling (âbypassing ETW and Windows 11 (24H2) security featuresâ).
- [T1018] Remote System Discovery â PureLogs profiles the victim system using WMI to gather system information (âleverages Windows Management Instrumentation (WMI) to profile the victimâs system environmentâ).
- [T1119] Automated Collection â The malware runs asynchronous tasks to gather browser, app, and file-search data (âCreateDemoBrowserDataAsyncâ, âCreateDemoDiscordAsyncâ, and âCreateDemoFileSearchAsyncâ).
- [T1005] Data from Local System â It harvests local browser data, wallet data, communication apps, and files from the victim machine (âThe following is a list of harvested itemsâ).
Indicators of Compromise
- [IP address] C2 server used by the campaign â 5[.]101[.]84[.]202
- [URL] PNG payload hosted as steganographic carrier â hxxps://everycarebd[.]com/imagelkjh0987[.]png
- [SHA256 hash] malware sample hash â 8d0bcde739929fe41a6bcaaa62f7cba802af90b2ba8dea6ed1a4821236cdd5886910d27b9e1dc2229a8c280f5d0cea85146d50274c56a4d9a5b8d1793505b1b993724f1a9ad3a28c171927fc449ac34dc6ca890f915f00210e8b305577388c6e0fcb86ae384e9975933314ac2a231f0ff46c0208556bf4a16f096a642d3f505e1b730de72f921458b6b162b105a9521a931f07e19d3cac53207c7a8efbc412f9e2308749f6b7b7573009d0cac6616a6aa83cecb1f2933e868776400d122c86ec