General
-
Target
8911284780.zip
-
Size
2.6MB
-
Sample
230130-kfpl9shg42
-
MD5
082dd127f07976e439e5301773108883
-
SHA1
72aa15b54a7970323648e7d373067d10e5957d81
-
SHA256
25292e7c037952bac53038432d60eb4799bcf3b507e88fa1073de7000177bcbd
-
SHA512
31ccfc5349046b4100da42a3083fc47aa3a81f76aed27c2dedca53c7cfafa8eb84ea14d29ebf1419aff0c3f960304fde5422a10e395c7926fc5aab8de8fc9ada
-
SSDEEP
49152:Co5ngO60hTI/9+/Ned6NDEsUgs3pIJEIJrKoz46gNJKY6PdBBqLK:CodEN9+Ed6NDEsapIJvJdLY6zBaK
Static task
static1
Behavioral task
behavioral1
Sample
e3c292ebdfb1ae04e44bcaa6c41c8ad4c6a1c859175df7b64a7bd9fbf01b6fd1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e3c292ebdfb1ae04e44bcaa6c41c8ad4c6a1c859175df7b64a7bd9fbf01b6fd1.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
quasar
1.3.0.0
SUCCESS
41.185.97.216:4782
MUTEX_QAxMFzrXWG2cbIHPGK
-
encryption_key
JRUJdiIOmPJ5LlsFaVs9
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
cmd
-
subdirectory
SubDir
Targets
-
-
Target
e3c292ebdfb1ae04e44bcaa6c41c8ad4c6a1c859175df7b64a7bd9fbf01b6fd1
-
Size
2.7MB
-
MD5
d587b4883793de72536108a8cb6373ef
-
SHA1
716e123537c7df451eff37da69a7747f8f99e3c1
-
SHA256
e3c292ebdfb1ae04e44bcaa6c41c8ad4c6a1c859175df7b64a7bd9fbf01b6fd1
-
SHA512
4cab1b454d56ced352905425ca0b9bfc3b532dd0a2cb242f02e099eef11892a44c4f89b8e4930f6ac8b31def7c5ddae419df0369de26911ba51be09e46912687
-
SSDEEP
49152:Hur58NWGHSN7CNMU7Ptj1oUEQMubc88zCTKRxVjjR8IqSe0HJbYF:Oi1OiMGtqUEQ/g8XGvFj5qSe0HJ
-
Detect PureCrypter injector
-
Modifies WinLogon for persistence
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-