General
-
Target
4687334c1de102b96d6f0f34ccbfc3aa07465c4d2c4cb328cc3808794b607732
-
Size
68KB
-
Sample
230202-g6t3wsfc68
-
MD5
5e458aefc13ee7f88e89530eac9dbb95
-
SHA1
a1161199394f1a303c39b6ce8fc4749866bed921
-
SHA256
4687334c1de102b96d6f0f34ccbfc3aa07465c4d2c4cb328cc3808794b607732
-
SHA512
bff4013979c02f801839d7a04a0cce87bae1232e9859e4bb9e0d600076c7af33bfc338a91414e8981007818ec2e43d9c8829e83e69538cd5ec60a7a40e349cb2
-
SSDEEP
96:5abhS0a8S2QYHdkMfcSBSGjmHCJoFAD4PF9MxM/bRrkQIOLFnU:cbhS0a8S2tH9lkCql99MxMDRAwu
Static task
static1
Behavioral task
behavioral1
Sample
INV-0097H.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
INV-0097H.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.aewwholesale.com - Port:
2525 - Username:
[email protected] - Password:
clgn6qPzaP
Targets
-
-
Target
INV-0097H.exe
-
Size
6KB
-
MD5
4a63e62a75447c399f717fd40805ada8
-
SHA1
72a8c04321d4547c02464151ff585e5989d04d13
-
SHA256
f5ee72bc3ed7127fdea098689d11b7c18f9bb5debbab5e4f5b0293b8017692e0
-
SHA512
28ac8303385ad8888afee696bea516a2bc88dac8a857f67ef6640d7ed0363b596d048f21973dc933e35b9167948ec515a92a68b27e0901cb90aaf1212caff78c
-
SSDEEP
96:zHdkMfcSBSGjmHCJoFAD4PF9MxM/bRrkQIOLFnU:zH9lkCql99MxMDRAwu
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-