General
-
Target
C4PRSetup.exe
-
Size
354KB
-
Sample
230919-xxcegsdf57
-
MD5
0a62c241828711c850366f7862af93a8
-
SHA1
cb2e6b819bc056a7a15d383f8459d1682885e8f0
-
SHA256
6778fbe1bcd9e40dbb6d7459844eb7cf23143ac52630f3bfe12875d41711a7df
-
SHA512
36e1c9aa4b60f03dd914204c50bb70052941a213ff3d8525ba42d688c122a17489e13a5da4292c28629de318f120a015b3404522b9878fe60ae361cf5240bc7a
-
SSDEEP
6144:IhAQlNW5SCKJ7Z0zHcJ6Wgh15rGdARtGcTnCPVJdzBmPKfK9:+AINrJ7aHxWgH5RlnCPVJFAY
Static task
static1
Behavioral task
behavioral1
Sample
C4PRSetup.exe
Resource
win10-20230915-en
Malware Config
Targets
-
-
Target
C4PRSetup.exe
-
Size
354KB
-
MD5
0a62c241828711c850366f7862af93a8
-
SHA1
cb2e6b819bc056a7a15d383f8459d1682885e8f0
-
SHA256
6778fbe1bcd9e40dbb6d7459844eb7cf23143ac52630f3bfe12875d41711a7df
-
SHA512
36e1c9aa4b60f03dd914204c50bb70052941a213ff3d8525ba42d688c122a17489e13a5da4292c28629de318f120a015b3404522b9878fe60ae361cf5240bc7a
-
SSDEEP
6144:IhAQlNW5SCKJ7Z0zHcJ6Wgh15rGdARtGcTnCPVJdzBmPKfK9:+AINrJ7aHxWgH5RlnCPVJFAY
Score10/10-
Detect Poverty Stealer Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Stops running service(s)
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-