General

  • Target

    8e246de1c3fe44c5d6d85c67755b3a798bcdb37695aa6ca1bdd1e03307365612

  • Size

    5KB

  • Sample

    231122-ejctzsaa44

  • MD5

    f5c8dde7474ca2b3e261d44496bc978c

  • SHA1

    151aea4d6d7c182cb74e70aeeef3dae4e79fc25e

  • SHA256

    8e246de1c3fe44c5d6d85c67755b3a798bcdb37695aa6ca1bdd1e03307365612

  • SHA512

    a90b6b3f02d5e17e6e9b0907cab363780d32f9d523447f40f2d523ef7ae288e9a46703933a1678eed962a320d46ee1336155a31207d337404208d7dcef2f477d

  • SSDEEP

    96:3e2aZ/W0hFEjyt7EtQdv8+OsXyxCmmU/DiuoYOs9jdpSWyY0PvGsLcfVFy5qNaE/:3e1ZZrLt7EQbXy8mdDiuoqjSRPvONi+/

Malware Config

Extracted

Family

purecrypter

C2

https://teleturismo.it/wp-includes/Tzvgdu.vdf

Targets

    • Target

      202311218800-INV62009HX66549.scr

    • Size

      14KB

    • MD5

      19395fea893e3dcea476504227d56be6

    • SHA1

      f86b35526cd61c8aab3911b11ca692225e341906

    • SHA256

      3fcb840d5e65fc86ed5637bdcbab0ecde764d360ebe18a5e5d6795811dc1c622

    • SHA512

      567acf5e2be2482d923142c3bd574f79475abdcfd9f63768bfe5632fe43b9ebfde3b7865c2d1971eb922686deeac4322d1c627329c96621b0c3b31940586d724

    • SSDEEP

      192:Uebp41yqqdcA32GG0s4LqVrTC+xV/knQi1oo79ED607RQ:UeboyqCZ2GGOLqVTfknQyMR

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks