How to identify #PureRAT (aka #ResolverRAT):
⛳️ C2 port is often 56001, 56002 or 56003
🔢 Bot sends 04 00 00 00, then TLS handshake
🔑 Client and server run TLS 1.0
🖊️ X.509 cert is self signed
📅 X.509 cert expires 9999-12-31
netresec.com?b=2589522
>PureRAT is the exact same malware as what Morphisec and others call ResolverRAT. PureHVNC, on the other hand, is the predecessor to PureRAT.
IOCs:
👾 193.26.115.125:8883
👾 purebase.ddns[.]net:8883
👾 45.74.10.38:56001
👾 139.99.83.25:56001
https://netresec.com/?b=2589522
#ResolverRAT is a new #backdoor that uses advanced persistence mechanism, certificate validation, obfuscation, & C2 architecture to stay undetected. Protect yourself by deploying our public #YARArules.👇 github.com/reversinglab...
🚨 ResolverRAT Targets Healthcare and Pharma! 🚨
🔎 Read More: technijian.com/cyber-securi...
#CyberSecurity #ResolverRAT #HealthcareCybersecurity #PharmaSecurity #MalwareAlert #PhishingAwareness #EndpointSecurity #SOCMonitoring #IncidentResponse #Technijian #DataProtection
🦠 Nuevo Malware ResolverRAT apunta al Sector Salud y Farmacéutico a Nivel Global ciberninjas.com/nuevo-malwar...
#Malware #ResolverRAT #Ciberamenazas #Ciberseguridad #RAT #SaludDigital #Farmacéutica #AmenazasGlobales #AtaquesDirigidos
🚨🪝 Scammers are targeting healthcare and pharma firms with phishing emails in their native languages, leading to infections by a new, evasive malware called #ResolverRAT.
Read: hackread.com/native-langu...
#CyberSecurity #Malware #Phishing #Healthcare
#Cyberattaque #mondiale : le #virus #ResolverRAT prend d’assaut le secteur de la #santé et de la #pharmacie
www.01net.com/actualites/c...
“Dans les secteurs de la santé et de l'industrie pharmaceutique” : mise en lumière de #ResolverRAT, un Cheval de Troie multi-fonctions redoutable !
blog.sosordi.net/2025/04/dans...
#securite #data #trojan #Internet
A new malware campaign using ResolverRAT is targeting healthcare and pharma sectors with phishing emails and DLL side-loading.
#Cybersecurity #ResolverRAT #Phishing #Malware #Infosec #ThreatIntel
#ResolverRAT evolves—now uses API unhooking, indirect syscalls, and heap encryption to evade EDR.
Active in healthcare attacks: securityonline.info/resolverrat-... #CyberSecurity #Malware
New #ResolverRAT variant emerges—evades detection with maze-like code obfuscation, targets healthcare data.
Technical analysis: www.morphisec.com/blog/new-mal... #CyberSecurity #Malware
#ResolverRAT targets healthcare/pharma via phishing & DLL sideloading—steals research data and patient records.
Active campaign: thehackernews.com/2025/04/reso... #CyberSecurity #HealthIT
Resolverrat colpisce sanità e farmaceutica con phishing localizzati e caricamento in memoria tramite dll e framework .net
#accessoremoto #DLLsideloading #evasione #malware #PHISHING #resolverrat #sanità #sideloading
www.matricedigitale.it/sicurezza-in...
新たなResolverRATマルウェアが世界中の製薬会社や医療機関を標的に
New ResolverRAT malware targets pharma and healthcare orgs worldwide #BleepingComputer (Apr 14)
#ResolverRAT #医療セキュリティ #フィッシング攻撃 #メモリ内マルウェア #RAT