General
-
Target
Pure Crypter Leak_nls..scr
-
Size
362KB
-
Sample
240523-thj91agf69
-
MD5
7c031479dedab585b453098453a09f35
-
SHA1
401ec0bf7ce170a67c0317150c2b83885e8abc54
-
SHA256
138be3a5769af371a332cf9404cca591cd78d594d6a072fa8047e222ac92770e
-
SHA512
17160d0c966c6ea6f8ac182ccd361baf2900dbfbf92ae59804861a404ba5a77a37e499ae0ac2588d46fcd26ce08d29a02e66b09894e4319212fb9f0d23a9643f
-
SSDEEP
6144:rBx7iw0qvLJXnlUGujCtjno6itQl+REw6FMG/UHQS8PUHIRA8yVYtFmCaxHU0bM:rTkqjVnl36ud0zR/6CtQ9PUHIG8Dn
Static task
static1
Behavioral task
behavioral1
Sample
Pure Crypter Leak_nls..scr
Resource
win7-20240508-en
Malware Config
Extracted
asyncrat
0.5.8
OP
20.117.108.240:5612
HssS7dvHeccj
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.8
OS
20.117.108.240:7825
IOr8QBoiV215
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Pure Crypter Leak_nls..scr
-
Size
362KB
-
MD5
7c031479dedab585b453098453a09f35
-
SHA1
401ec0bf7ce170a67c0317150c2b83885e8abc54
-
SHA256
138be3a5769af371a332cf9404cca591cd78d594d6a072fa8047e222ac92770e
-
SHA512
17160d0c966c6ea6f8ac182ccd361baf2900dbfbf92ae59804861a404ba5a77a37e499ae0ac2588d46fcd26ce08d29a02e66b09894e4319212fb9f0d23a9643f
-
SSDEEP
6144:rBx7iw0qvLJXnlUGujCtjno6itQl+REw6FMG/UHQS8PUHIRA8yVYtFmCaxHU0bM:rTkqjVnl36ud0zR/6CtQ9PUHIG8Dn
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1