General
-
Target
7b0c5b6d2b384472a66a91446e3871a6
-
Size
111KB
-
Sample
230316-brp8hagc62
-
MD5
7b0c5b6d2b384472a66a91446e3871a6
-
SHA1
43f7d3727ff16afed19acd8a152c13b72b789d5f
-
SHA256
48d5f8ef5449387f721907a96a8eab0f7827f393db4c96d351bab43de7944d95
-
SHA512
214b1ec30417fd5c009f7cace9855d2bff2417099d6b863fbc014bc57a0e041b100a7585dd719af0d3398474b860f05d75d7b8fc3f979b2a8eada2d1b362e501
-
SSDEEP
768:iH059SCyqm4AxvqFTTT5jTTTT+lYeAcoMNii6LKtMwZ5JkQ0sKoIQr0/FLyTsMa7:807SCxCQTTT5jTTTT+rzVb00fLZDQ
Behavioral task
behavioral1
Sample
7b0c5b6d2b384472a66a91446e3871a6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7b0c5b6d2b384472a66a91446e3871a6.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
purecrypter
https://firebasestorage.googleapis.com/v0/b/hjop-9ee35.appspot.com/o/Xuwbqh.dat?alt=media&token=f8835a49-5488-429f-8453-0ec2ff1d135e
Extracted
netwire
netwire2021.duckdns.org:7929
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
qFlJFfII
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Targets
-
-
Target
7b0c5b6d2b384472a66a91446e3871a6
-
Size
111KB
-
MD5
7b0c5b6d2b384472a66a91446e3871a6
-
SHA1
43f7d3727ff16afed19acd8a152c13b72b789d5f
-
SHA256
48d5f8ef5449387f721907a96a8eab0f7827f393db4c96d351bab43de7944d95
-
SHA512
214b1ec30417fd5c009f7cace9855d2bff2417099d6b863fbc014bc57a0e041b100a7585dd719af0d3398474b860f05d75d7b8fc3f979b2a8eada2d1b362e501
-
SSDEEP
768:iH059SCyqm4AxvqFTTT5jTTTT+lYeAcoMNii6LKtMwZ5JkQ0sKoIQr0/FLyTsMa7:807SCxCQTTT5jTTTT+rzVb00fLZDQ
-
Modifies WinLogon for persistence
-
NetWire RAT payload
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-