General

  • Target

    b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f

  • Size

    3.3MB

  • Sample

    230204-h32t1acg58

  • MD5

    031e2e05add303f0e8adbca3be022151

  • SHA1

    719acfd7047f5a2003ed1386b97ed5e2868d09d2

  • SHA256

    b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f

  • SHA512

    86b5466b716bddceb1b6ef482f1683f248e8120100d8e529178a21d4542337d3b4c9362bb4fbbf90c2759d8413f3e2ca2112a20e32dccd44bce07bb9c3388536

  • SSDEEP

    49152:By408wwmrOYMMJNBzgz15u+djZSHc2E2Y8csb6Aged9XJUOHUr+RmE:ayoDz+15VzSHc2EJ8cc3xtoKU

Malware Config

Targets

    • Target

      b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f

    • Size

      3.3MB

    • MD5

      031e2e05add303f0e8adbca3be022151

    • SHA1

      719acfd7047f5a2003ed1386b97ed5e2868d09d2

    • SHA256

      b5012f4ee136a3d2bc2cb89dc749cedc8d65dded53d2a7418342ad578db3ef6f

    • SHA512

      86b5466b716bddceb1b6ef482f1683f248e8120100d8e529178a21d4542337d3b4c9362bb4fbbf90c2759d8413f3e2ca2112a20e32dccd44bce07bb9c3388536

    • SSDEEP

      49152:By408wwmrOYMMJNBzgz15u+djZSHc2E2Y8csb6Aged9XJUOHUr+RmE:ayoDz+15VzSHc2EJ8cc3xtoKU

    • Detect PureCrypter injector

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

5
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

2
T1120

Tasks