Red and black digital background with binary code, a padlock icon, and the word PureRAT in bold white letters on a red rectangle, suggesting cybersecurity or malware context.

New PureRAT Campaign Hides PE Payloads in PNG Files and Executes Them Filelessly

By Published On: April 22, 2026

 

The silent specter of advanced malware continuously evolves, seeking new camouflage to evade detection. A recently uncovered campaign illustrates this perfectly: a sophisticated Remote Access Trojan (RAT) named PureRAT is now actively compromising Windows systems, distinguishing itself by embedding malicious executable payloads within seemingly innocuous PNG image files, executing them entirely in memory.

This innovative approach represents a significant challenge for traditional security defenses, as it bypasses file-based scanning and leaves minimal forensic trace. Understanding this novel technique is critical for organizations looking to bolster their defensive posture against modern threats.

PureRAT: A Deeper Dive into the Stealthy Campaign

The PureRAT campaign leverages a potent combination of obfuscation and fileless execution to achieve its objectives. At its core, PureRAT is a versatile remote access trojan, capable of a wide array of malicious activities once it establishes a foothold. This includes data exfiltration, keystroke logging, remote command execution, and much more, granting attackers extensive control over compromised machines.

What elevates this particular campaign is its ingenious method of payload delivery. Instead of traditional executable files, the PureRAT operators are embedding their malicious Portable Executable (PE) code directly into PNG image files. These images, when viewed or processed by standard software, appear normal, thus evading immediate suspicion and many static analysis tools.

The Art of Evasion: PE Payloads in PNGs

The technique of hiding executable code within other file types is not entirely new, but its application with PE payloads in PNGs, followed by fileless execution, demonstrates a refined level of stealth. Here’s a breakdown of the process:

  • Initial Compromise: While the initial infection vector isn’t explicitly detailed, it typically involves phishing emails, malicious downloads, or exploited vulnerabilities.
  • Stage 1 Payload: A small, often obfuscated dropper is likely executed first. This dropper’s primary role is to retrieve the PNG file containing the hidden PE payload.
  • Payload Extraction: Instead of saving the PNG and then executing a separate executable, the dropper strategically reads specific sections of the PNG file in memory. These sections contain the encrypted or encoded PE payload.
  • Decryption and Decompression: The extracted data is then decrypted and possibly decompressed in memory, revealing the true PureRAT executable.
  • Fileless Execution: Crucially, the PureRAT payload is then loaded and executed directly from memory, without ever being written to disk as a traditional executable. This “living off the land” technique makes detection by endpoint detection and response (EDR) solutions that rely heavily on file system monitoring significantly harder.

This fileless approach significantly reduces the attack’s footprint, making post-compromise forensic analysis more challenging for security professionals.

Implications for Cybersecurity Defenses

The PureRAT campaign underscores the need for organizations to move beyond signature-based detection and enhance their behavioral analysis capabilities. Traditional antivirus solutions often struggle to detect fileless attacks or payloads hidden within benign file formats.

Key challenges for defenders include:

  • Bypassing File Scanners: Since the PE payload is embedded within a PNG, file scanners might categorize the file as a legitimate image.
  • Evading Disk-Based Forensics: The fileless execution means there’s no malicious executable file on disk for forensic analysts to easily find and analyze.
  • Memory Analysis Complexity: Detecting and analyzing malware running purely in memory requires advanced memory forensics tools and expertise.

Remediation Actions and Proactive Defense

Defending against advanced threats like the PureRAT campaign requires a multi-layered security strategy focused on prevention, detection, and response.

  • Enhance Email Security: Implement robust email security gateways with advanced threat protection, sandboxing, and URL rewriting to prevent initial infection via phishing. Regularly train users on identifying phishing attempts.
  • Implement Endpoint Detection and Response (EDR): EDR solutions with strong behavioral analysis capabilities are crucial. They can detect suspicious process injection, memory anomalies, and unusual system calls indicative of fileless malware execution.
  • Strengthen Network Segmentation: Segment networks to limit lateral movement if a system is compromised.
  • Principle of Least Privilege: Enforce the principle of least privilege for all user accounts and applications, limiting the potential impact of a successful compromise.
  • Regular Software Patching: Ensure all operating systems, applications, and browsers are kept up-to-date with the latest security patches to close known vulnerability gaps.
  • Application Whitelisting: Implement application whitelisting to prevent unauthorized executables from running on endpoints. While not foolproof against fileless attacks, it can significantly mitigate other infection vectors.
  • Memory Forensics: Develop capabilities for real-time and post-incident memory forensics to identify and analyze in-memory threats.

Detection Tools and Strategies

Effective detection of campaigns like PureRAT involves a combination of tools and proactive strategies. While no single tool is a silver bullet, combining different approaches significantly improves defensive posture.

Tool Category Purpose Examples / Approach
Endpoint Detection and Response (EDR) Monitors endpoint and network events to detect suspicious behavior, memory injection, and fileless execution. CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint
Next-Generation Antivirus (NGAV) Utilizes machine learning and behavioral analysis to identify unknown threats, beyond signature-based detection. Palo Alto Networks Cortex XDR, Sophos Intercept X
Network Traffic Analysis (NTA) Detects anomalous network traffic patterns, command-and-control (C2) communications, and data exfiltration attempts. Zeek (Bro IDS), Suricata, Corelight
Security Information and Event Management (SIEM) Aggregates and analyzes security logs from various sources to identify correlation patterns indicative of an attack. Splunk, IBM QRadar, Elastic SIEM
Memory Forensics Tools Analyzes system memory dumps to identify malicious processes, injected code, and artifacts of fileless malware. Volatility Framework, Mandiant RedLine
Email Security Gateways (ESG) Filters malicious emails, detects phishing attempts, and provides sandboxing for suspicious attachments/links. Proofpoint, Mimecast, Microsoft 365 Defender

Conclusion

The PureRAT campaign, with its innovative use of PE payloads hidden within PNG files and fileless execution, serves as a potent reminder of the ever-increasing sophistication of cyber adversaries. Traditional perimeter defenses are no longer sufficient. Organizations must embrace a proactive, defense-in-depth strategy that prioritizes behavioral detection, robust endpoint security, continuous monitoring, and a strong security awareness program.

Staying informed about emerging threats and adapting security controls accordingly is paramount to safeguarding digital assets in the face of these evolving challenges. The battle for cyberspace is a continuous one, demanding vigilance and continuous adaptation from all defenders.

 

Share this article

Leave A Comment