General
-
Target
e1c771cceb693ea14bbcde32ac1355fc.bin
-
Size
1.7MB
-
Sample
230206-mw7twsde75
-
MD5
77837f8185043a87794f3757d06753b6
-
SHA1
24c44d99ddfb565c447f91430d75870ef5b45f04
-
SHA256
a2f3bb5998f5e8079f4556198531fa771f3b6cfd9cffd8f684e1a30e6191b97a
-
SHA512
58fcd5992eea39088f4306e886e88ec9e6b0bc63072b9450f7dc08e423365d18b1d1ae023a56fe327908e4972c65f96f33f990d7edd6690e9834290ece563cf3
-
SSDEEP
49152:WShBDgd49O2Zm8NANHrs+/gE+fAItUAQrYsxweVYF+D8dhO08s+n1:B2j2ELSht6rR6Fw8/OxsO1
Static task
static1
Behavioral task
behavioral1
Sample
70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
remcos
IKMERRO2023
5.2.68.82:1198
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Explorer.exe
-
copy_folder
ATM Machine
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
1234567ME
-
mouse_option
false
-
mutex
12345ME-2V5C4Q
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Explorer
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe
-
Size
2.5MB
-
MD5
e1c771cceb693ea14bbcde32ac1355fc
-
SHA1
bc2da06db4b0cc42595b7761ff990e303441cd99
-
SHA256
70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9
-
SHA512
fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff
-
SSDEEP
24576:CsLDsY5ohQjNm5lGrJrGU/thfLixwfA7DgCBbZoiSNy5aKg88vX6yqlAtVULkfSO:C3FYVr4U/3L7yRAUQKuakLomg0BqKqw
-
Detect PureCrypter injector
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-