General

  • Target

    download

  • Size

    2KB

  • Sample

    240815-rf2edsvhrc

  • MD5

    8f37f574ece151d1e559d62ed80c46b2

  • SHA1

    a1654ac0d1b62d819a8969e0ccd19ed801262c61

  • SHA256

    2cc91a40bead49c68b92da489dd5bae6c59071335086cd266224211d53262137

  • SHA512

    4a5b9e5c9510a88c4bcfbd4ef16400d119576c22d0437da8143bfa1d016a1ea21a5e56d358fefd19b15eee7154b81de59ab3944015b8c8a2d1828f4b1029b545

Malware Config

Targets

    • Target

      download

    • Size

      2KB

    • MD5

      8f37f574ece151d1e559d62ed80c46b2

    • SHA1

      a1654ac0d1b62d819a8969e0ccd19ed801262c61

    • SHA256

      2cc91a40bead49c68b92da489dd5bae6c59071335086cd266224211d53262137

    • SHA512

      4a5b9e5c9510a88c4bcfbd4ef16400d119576c22d0437da8143bfa1d016a1ea21a5e56d358fefd19b15eee7154b81de59ab3944015b8c8a2d1828f4b1029b545

    • PureLog Stealer

      PureLog Stealer is an infostealer written in C#.

    • PureLog Stealer payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks