General
-
Target
C4PROsetup.exe
-
Size
1.5MB
-
Sample
230927-prx51aag2s
-
MD5
3eb322413d88110f64b4bb8fed638a61
-
SHA1
3648f10a7c186853b236e279d54e4c7ed0416e5b
-
SHA256
7934237a4456c4286ecf3698c3a4e7cfa5241a7a7bab344c74ac9ae73c54980d
-
SHA512
3a4bf59ec85c8ec6f48ca4668f2c8a6c0d0e3925fa8b197f35a0ad07fb635f9bc7fe5f55f106319c57d899cab45364994d7daeabda92fb1a29999832db5dde47
-
SSDEEP
24576:JmhJNqxBA6KQc7UISy95IiRgxghbc2ZFwv/Tnyy5R5IyO0WdtALZ:JyMAQKRHugvFW+y5Rajdt
Static task
static1
Behavioral task
behavioral1
Sample
C4PROsetup.exe
Resource
win10-20230915-en
Malware Config
Targets
-
-
Target
C4PROsetup.exe
-
Size
1.5MB
-
MD5
3eb322413d88110f64b4bb8fed638a61
-
SHA1
3648f10a7c186853b236e279d54e4c7ed0416e5b
-
SHA256
7934237a4456c4286ecf3698c3a4e7cfa5241a7a7bab344c74ac9ae73c54980d
-
SHA512
3a4bf59ec85c8ec6f48ca4668f2c8a6c0d0e3925fa8b197f35a0ad07fb635f9bc7fe5f55f106319c57d899cab45364994d7daeabda92fb1a29999832db5dde47
-
SSDEEP
24576:JmhJNqxBA6KQc7UISy95IiRgxghbc2ZFwv/Tnyy5R5IyO0WdtALZ:JyMAQKRHugvFW+y5Rajdt
Score10/10-
Detect Poverty Stealer Payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Stops running service(s)
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-