A fresh evasion threat operation is spewing out several trojans and ransomware using the relatively new PureCrypter malware loader. The loader is being used by an unidentified threat actor to target government organisations in the North American and Asia Pacific areas, according to researchers.
A malicious password-protected ZIP file that is present in it triggers the download of the PureCrypter loader. Once being distributed, the loader leverages a compromised non-domain profit’s as a C2 server to send the secondary payloads.