General

  • Target

    e4d9015e2bed3af0480b51231b68bb23.exe

  • Size

    194KB

  • Sample

    230202-ym4xesfa95

  • MD5

    e4d9015e2bed3af0480b51231b68bb23

  • SHA1

    c148f8cc0d8930602a00155cc0f370d2e22a811a

  • SHA256

    893f1df3f71f13731482f53655a5f6470ee00eae87f84e31da4af2950df80cef

  • SHA512

    5bc66c3aac2497c2e3df851dc75011cf529a0fd76ab18280a626c4a2975b07e740ed74cbb6afe9b4ea518d4a2772f5783120c3881ff551ef2be14abb0842c665

  • SSDEEP

    6144:+rdOfeBDRzseSmV7v2PCc4gorppZiG73TAW:+rdOfeia79

Malware Config

Targets

    • Target

      e4d9015e2bed3af0480b51231b68bb23.exe

    • Size

      194KB

    • MD5

      e4d9015e2bed3af0480b51231b68bb23

    • SHA1

      c148f8cc0d8930602a00155cc0f370d2e22a811a

    • SHA256

      893f1df3f71f13731482f53655a5f6470ee00eae87f84e31da4af2950df80cef

    • SHA512

      5bc66c3aac2497c2e3df851dc75011cf529a0fd76ab18280a626c4a2975b07e740ed74cbb6afe9b4ea518d4a2772f5783120c3881ff551ef2be14abb0842c665

    • SSDEEP

      6144:+rdOfeBDRzseSmV7v2PCc4gorppZiG73TAW:+rdOfeia79

    • Detect PureCrypter injector

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks