General
-
Target
d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36.exe
-
Size
105KB
-
Sample
230206-h2nwrace46
-
MD5
a6d97b5c9d9a4932b5c6c7457bc8c60e
-
SHA1
7afa706e0ad9c9be82711b1b2c1e113534da70c5
-
SHA256
d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36
-
SHA512
aa14f821365c6fbe6e7cb1fbae28d59ae879e90d7e6143356b0d8db3fc129ca1486e7ba9973a394d444a51a47fe80e4bd15082506761d7401d4c4ac977800196
-
SSDEEP
1536:FPRNkYJTrgdiPluOcN6IBVEqp+xJHWe2zm4uz5dh3Hkq4/T6dcE1sgxcirUt:FPR9ttcQIToHWef4u136E6gxcirUt
Static task
static1
Behavioral task
behavioral1
Sample
d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
purecrypter
http://modeloartesanatos.com.br/wp-admin/images/Zqchb.bmp
Targets
-
-
Target
d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36.exe
-
Size
105KB
-
MD5
a6d97b5c9d9a4932b5c6c7457bc8c60e
-
SHA1
7afa706e0ad9c9be82711b1b2c1e113534da70c5
-
SHA256
d0a4e0e3ed54a45113962e05be0fecc8143c3484fbcbb3c890d8ea41f7586e36
-
SHA512
aa14f821365c6fbe6e7cb1fbae28d59ae879e90d7e6143356b0d8db3fc129ca1486e7ba9973a394d444a51a47fe80e4bd15082506761d7401d4c4ac977800196
-
SSDEEP
1536:FPRNkYJTrgdiPluOcN6IBVEqp+xJHWe2zm4uz5dh3Hkq4/T6dcE1sgxcirUt:FPR9ttcQIToHWef4u136E6gxcirUt
-
Detects Smokeloader packer
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-