General

  • Target

    584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe

  • Size

    7KB

  • Sample

    240606-q38ljseh6w

  • MD5

    e0354350b177887076f4c89567e0af8d

  • SHA1

    999fc3514c83f5b3bfaf899b656a194f7f60ed05

  • SHA256

    584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032

  • SHA512

    5972d529569ad3aecd8a02de1b2150a3901e2fe09aa5223956d4fd9f77ec9acd308d938c5748b8e38b6090484d0ec6f288f2295f67a6fcc12b0dc770620600fd

  • SSDEEP

    96:nGJKj1y2oPbML8RcyuHazDvDId4IBmc+TMsa+aIVzNt:G4jU2o48RVHA4U0Zv

Malware Config

Extracted

Family

purecrypter

C2

https://www1.militarydefensenow.com/Stay/Vdopcuygit.vdf

Targets

    • Target

      584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032.exe

    • Size

      7KB

    • MD5

      e0354350b177887076f4c89567e0af8d

    • SHA1

      999fc3514c83f5b3bfaf899b656a194f7f60ed05

    • SHA256

      584c91693287a0d6c66f27a8c0f1841aad3368bc48b9d36b1088548f9f370032

    • SHA512

      5972d529569ad3aecd8a02de1b2150a3901e2fe09aa5223956d4fd9f77ec9acd308d938c5748b8e38b6090484d0ec6f288f2295f67a6fcc12b0dc770620600fd

    • SSDEEP

      96:nGJKj1y2oPbML8RcyuHazDvDId4IBmc+TMsa+aIVzNt:G4jU2o48RVHA4U0Zv

    • PureCrypter

      PureCrypter is a .NET malware loader first seen in early 2021.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks