General
-
Target
12f82bd59a4b2273510a7a2c01b82f6b.exe
-
Size
7.2MB
-
Sample
230131-j1j2vahc6s
-
MD5
12f82bd59a4b2273510a7a2c01b82f6b
-
SHA1
be9c13bf17fe304597729fc71f3eafff02e02a44
-
SHA256
7200e2fdf4dc5ccbdf12e1cdd109d878f0e0909f3530769376c7f154385633d4
-
SHA512
d8bf6d52b29d82805d750539122110c9614263d088665adbf7ba2d932245425593ecd7b8378183bbe31fbc4f198075edf0f292473f925286f6eaf6c7e3ff725f
-
SSDEEP
98304:os1DgtKt0M154pX1M0gF9OtfXJroEBV5FL0BsS4HJG+V5Os+vE9zK2SCmBh:gk54fmotPxoI++nOv8ICmBh
Behavioral task
behavioral1
Sample
12f82bd59a4b2273510a7a2c01b82f6b.exe
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
12f82bd59a4b2273510a7a2c01b82f6b.exe
-
Size
7.2MB
-
MD5
12f82bd59a4b2273510a7a2c01b82f6b
-
SHA1
be9c13bf17fe304597729fc71f3eafff02e02a44
-
SHA256
7200e2fdf4dc5ccbdf12e1cdd109d878f0e0909f3530769376c7f154385633d4
-
SHA512
d8bf6d52b29d82805d750539122110c9614263d088665adbf7ba2d932245425593ecd7b8378183bbe31fbc4f198075edf0f292473f925286f6eaf6c7e3ff725f
-
SSDEEP
98304:os1DgtKt0M154pX1M0gF9OtfXJroEBV5FL0BsS4HJG+V5Os+vE9zK2SCmBh:gk54fmotPxoI++nOv8ICmBh
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-