General
-
Target
509cdbdfc3a9c49ba3fae4ecce54fbaed0b6f9f288dc300dc2b52989d502ae01
-
Size
2.4MB
-
Sample
230202-hkxsbsfd35
-
MD5
f087119254a5784dbc94b8324ebaca61
-
SHA1
d82b822ef3b58e35f96ec0fd9d5fc13954c85118
-
SHA256
509cdbdfc3a9c49ba3fae4ecce54fbaed0b6f9f288dc300dc2b52989d502ae01
-
SHA512
c4d9f9fd82d27f0f5dbab133482aa44cc110259f71630a43286d3f175c6e37206f96d6d83a492b2c9f4b1e12bd19aa513d0531f54a050e814204cbdc5995f322
-
SSDEEP
49152:pGUhixqZAPG4qYCno6kcShxpA1wkf3ejsEhu3SQcF9EYragT5VpgOZu8+Um0Q:pyxqGPGyEKe2sJECSdF9EYWgT5VpTZu6
Static task
static1
Behavioral task
behavioral1
Sample
509cdbdfc3a9c49ba3fae4ecce54fbaed0b6f9f288dc300dc2b52989d502ae01.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
509cdbdfc3a9c49ba3fae4ecce54fbaed0b6f9f288dc300dc2b52989d502ae01.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
509cdbdfc3a9c49ba3fae4ecce54fbaed0b6f9f288dc300dc2b52989d502ae01
-
Size
2.4MB
-
MD5
f087119254a5784dbc94b8324ebaca61
-
SHA1
d82b822ef3b58e35f96ec0fd9d5fc13954c85118
-
SHA256
509cdbdfc3a9c49ba3fae4ecce54fbaed0b6f9f288dc300dc2b52989d502ae01
-
SHA512
c4d9f9fd82d27f0f5dbab133482aa44cc110259f71630a43286d3f175c6e37206f96d6d83a492b2c9f4b1e12bd19aa513d0531f54a050e814204cbdc5995f322
-
SSDEEP
49152:pGUhixqZAPG4qYCno6kcShxpA1wkf3ejsEhu3SQcF9EYragT5VpgOZu8+Um0Q:pyxqGPGyEKe2sJECSdF9EYWgT5VpTZu6
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-