Between August and October 2025, a phishing campaign in Colombia exploited public trust by impersonating the Attorney General’s office to deliver Hijackloader malware, which in turn deployed PureHVNC, a remote-access tool (RAT) traded on underground forums. The campaign used Google Drive-hosted SVG files disguised as official legal documents to trick recipients into downloading password-protected ZIP archives.
This marks the first known large-scale use of Hijackloader and PureHVNC in Latin America, showcasing a growing trend of regionally targeted, multi-stage attacks combining social engineering and advanced evasion techniques. The operation demonstrates both technical sophistication and a clear focus on stealth, aiming to infiltrate Windows systems for persistent remote control and data theft.
The phishing emails prompted victims to download legal documents allegedly issued by the Attorney General’s office. Upon downloading the password-protected ZIP, the contained executable launched Hijackloader, which initiated a multi-stage infection chain culminating in the deployment of PureHVNC.
JLI.dll → MSTH7EN.dll), giving the impression of a legitimate process while executing the payload.Plagkeg.zk), rebuilt executable shellcode, and injected it into the vssapi.dll process to evade detection.ntdll.dll with a clean version to remove monitoring hooks. For persistence, it created scheduled tasks, startup shortcuts, and reloaded configurations via modTask and PERSDATA, ensuring long-term survival even after reboot.Email Address:
troquelesmyj[@]gmail.comDomains:
nuevos777[.]duckdns[.]org7octubredc[.]duckdns[.]orgdckis13[.]duckdns[.]orgdckis7[.]duckdns[.]orgenviopago[.]mysynology[.]netmaximo26[.]duckdns[.]orgsofiavergara[.]duckdns[.]orgURLs:
hxxps[:]//drive[.]google[.]com/file/d/1haApB_GMwZb83nw1YPdIDTLMtksRjkh/view?pli=1hxxps[:]//drive[.]google[.]com/file/d/1wzunPhL33jq_ZQug6k03hgxi4Eu57VfN/view?usp=sharingSHA256 Hashes (Samples):
e7120d45ee357f30cb602c0d93ed8d366f4b11c251c2a3cd4753c5508c3b15e514becb3a9663128543e1868d09611bd30a2b64c655dfb407a727a7f2d0fb8b7e776bbaa44c7788e0ccd5945d583de9473b6246c44906692cb0a52e6329cb213a1ae61edf35127264d329b7c0e2bddb7077e34cc5f9417de86ab6d2d65bad4b4f85641c8fb94e8e4c5202152dcbb2bb26646529290d984988ecb72e18d63c9bc5Tactics:
Techniques:
T1059: Command and Scripting Interpreter
Report Generated: October 30, 2025 | Admiralty Code: A1
 © 2025 Hive Pro | All Rights Reserved
 Learn more: www.hivepro.com
Get through updates and upcoming events, and more directly in your inbox