Weaponized RAR Archives Used by Hackers to Launch Targeted Malware Attacks

Cybersecurity researchers have reported a significant escalation in targeted malware attacks utilizing weaponized RAR archives to compromise Russian organizations.

The campaign, which began in March 2023, saw a fourfold increase in attacks in the first third of 2025 compared to the same period in 2024.

The threat actors are leveraging the Pure malware family, a malware-as-a-service (MaaS) solution first discovered in mid-2022, allowing widespread usage among cybercriminals.

The primary attack vector involves spam emails containing malicious RAR archives or links to such files.

These archives are often disguised with document-related filenames, frequently employing double extensions such as “.pdf.rar” to mislead users.

The archive names mimic the terminology of the accounting and business sectors, utilizing keywords such as “doc,” “akt,” “sverka,” “buh,” and “oplata,” increasing the likelihood of successful social engineering and infection.

Multi-Stage Infection Chain

Upon execution, the embedded executable file, masquerading as a PDF, initiates a complex infection chain.

RAR Archives
Infection scheme

The malware first replicates itself in the user’s %AppData% directory as “Task.exe” and establishes persistence via a VBS script (“Task.vbs”) placed in the Windows Startup folder.

It then extracts and decrypts additional payloads, ultimately loading the PureRAT backdoor.

PureRAT establishes secure SSL communications with its command-and-control (C2) servers, transmitting data in protobuf format compressed with gzip.

Exfiltrated data includes system identifiers, security software details, OS version, user and machine names, IP addresses, C2 endpoints, and system uptime.

In response, the C2 server may deliver auxiliary plugins, each extending PureRAT’s operational capabilities.

Modular Plugins Enhance Malicious Capabilities

Among the observed plugins:

  • PluginPcOption executes system-level commands, such as restarting or shutting down the infected host.
  • PluginWindowNotify monitors active window names for predefined keywords (including major bank names and financial terms), takes screenshots when matches occur, and transmits these to the C2 server—enabling the attacker to pivot to more intrusive actions, such as remote desktop control, when sensitive activity is detected.
  • PluginClipper monitors clipboard content for cryptocurrency wallet addresses. Upon detection, it substitutes them with attacker-controlled wallet addresses, capturing both the original and altered data for exfiltration. This plugin targets numerous cryptocurrency wallets, supporting Bitcoin, Ethereum, Litecoin, Monero, among others.
RAR Archives
Plugin main function code

The infection chain further introduces PureCrypter, a loader that downloads additional malicious components including payloads masked as benign media (e.g., .wav files).

According to Secure List Report, these are decrypted and executed in-memory to evade disk-based detection.

PureCrypter establishes further persistence, injects payloads into legitimate processes (such as InstallUtil.exe), and ultimately delivers the PureLogs stealer.

PureLogs is engineered for broad data theft across browsers (Chromium, Gecko), email clients (Foxmail, Mailbird, Outlook), file transfer utilities (FileZilla, WinSCP), steam and gaming clients, messaging applications (Discord, Telegram), and numerous VPN and cryptocurrency wallet applications.

Notably, browser extensions related to password management and cryptocurrency operations are prime targets.

Beyond credential theft, PureLogs supports commands to download and execute arbitrary files, collect files from specified directories, and exfiltrate them, presenting a significant risk for organizational compromise.

Despite utilizing known malware variants, the ongoing campaign demonstrates exceptional resilience and adaptability.

The strategic use of weaponized RAR archives, modular payloads, and the combination of credential theft with remote access capabilities underscore the need for vigilance.

Organizations are urged to strengthen email security, enhance employee awareness, and deploy layered security solutions incorporating anti-spam and anti-phishing mechanisms.

Indicators of Compromise (IOCs)

TypeValueDescription
MD5 Hash9B1A9392C38CAE5DA80FE8AE45D89A67doc_15042025_1c_akt_pdf.scr
MD5 HashDD2C1E82C5656FCB67AB8CA95B81A323StilKrip.exe
IP Address:Port195.26.227.209:56001PureRAT C2
IP Address:Port195.26.227.209:23075PureLogs C2
URLhttps[:]//apstori[.]ru/panel/uploads/Bghwwhmlr.wavPureCrypter Payload URL

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here