General
-
Target
094506dab589aa3933fe28379d607e4e.bin
-
Size
2.0MB
-
Sample
230206-jtb3nacf62
-
MD5
38290da5dcf0bbf58d9125e0935cb5b5
-
SHA1
c10323af5d6ab2a846fcf38fbd50b3d694132907
-
SHA256
e566072b5e8377bbb7697223a6a43161505955bed00c84ec3371df1782f8b28a
-
SHA512
3ff6475685bbe1a7ce803112dc9ef1af639ac56d7c5a22074286187a9bd7c9efbccbff54a263a26302c45ae2c0a0deaa3d014fc7d3c623d9fab47a4203337e64
-
SSDEEP
49152:P7RBoK+OrKTK9kgsujekQabRTYXvFtZsOHaCiB:H3+O9kVuHP2vfyOHdiB
Static task
static1
Behavioral task
behavioral1
Sample
8b45ddb55c917429dad237eac7bce95e29808c4157d098956144d19f247a1c0d.exe
Resource
win7-20221111-en
Malware Config
Extracted
vidar
2.3
886
https://t.me/mantarlars
https://steamcommunity.com/profiles/76561199474840123
-
profile_id
886
Targets
-
-
Target
8b45ddb55c917429dad237eac7bce95e29808c4157d098956144d19f247a1c0d.exe
-
Size
2.8MB
-
MD5
094506dab589aa3933fe28379d607e4e
-
SHA1
78b35e6e1c254f31079ea22a35fe5e0dde83848b
-
SHA256
8b45ddb55c917429dad237eac7bce95e29808c4157d098956144d19f247a1c0d
-
SHA512
5464a20e13a087fc56e441543d1182e2c7c80abd0156084d162a5b35cf0a357838b607f7956e07da6436ddc75abb22d7485c724b5770a6859f34d556ae0caa0e
-
SSDEEP
49152:ex04mKYkbtgQ/MwW/qvf7RZoVZZOHTjqFfK5r9oQSP1vh4CTRCC2OFj2OFS3:8juTq9zzWk99o11vhbTRCH3
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-