General

  • Target

    0db3a092fd8a1fde347ff770d94389891a89e91bcd7b14ef8f04ed56e706d781

  • Size

    350KB

  • Sample

    230623-slsj4sfe95

  • MD5

    5988969e8579949efde31126b36839a6

  • SHA1

    fd6ca1bf659f2c472564857209233aa6ebec9cd6

  • SHA256

    0db3a092fd8a1fde347ff770d94389891a89e91bcd7b14ef8f04ed56e706d781

  • SHA512

    25cd5a2b1ea03ebc72d5111905a5ae10641c8024d6ac44895771402e3696ed12b6bf007d4ee43c8ed2d3dae8120444619da165723837d52f6f8826f9c9b05245

  • SSDEEP

    6144:OVXpQXInUH9i88qBoMncqou5yCIAyPCLro3nFTFkZJnODxC8rRXYcQPq2wBhp1:OV+XInUH9i88qBoMcqdw9WOTrv2wBr

Malware Config

Extracted

Family

purecrypter

C2

http://cleaning.homesecuritypc.com/packages/Ikucx.dat

Targets

    • Target

      0db3a092fd8a1fde347ff770d94389891a89e91bcd7b14ef8f04ed56e706d781

    • Size

      350KB

    • MD5

      5988969e8579949efde31126b36839a6

    • SHA1

      fd6ca1bf659f2c472564857209233aa6ebec9cd6

    • SHA256

      0db3a092fd8a1fde347ff770d94389891a89e91bcd7b14ef8f04ed56e706d781

    • SHA512

      25cd5a2b1ea03ebc72d5111905a5ae10641c8024d6ac44895771402e3696ed12b6bf007d4ee43c8ed2d3dae8120444619da165723837d52f6f8826f9c9b05245

    • SSDEEP

      6144:OVXpQXInUH9i88qBoMncqou5yCIAyPCLro3nFTFkZJnODxC8rRXYcQPq2wBhp1:OV+XInUH9i88qBoMcqdw9WOTrv2wBr

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks