General
-
Target
download
-
Size
2KB
-
Sample
240815-rf2edsvhrc
-
MD5
8f37f574ece151d1e559d62ed80c46b2
-
SHA1
a1654ac0d1b62d819a8969e0ccd19ed801262c61
-
SHA256
2cc91a40bead49c68b92da489dd5bae6c59071335086cd266224211d53262137
-
SHA512
4a5b9e5c9510a88c4bcfbd4ef16400d119576c22d0437da8143bfa1d016a1ea21a5e56d358fefd19b15eee7154b81de59ab3944015b8c8a2d1828f4b1029b545
Static task
static1
Behavioral task
behavioral1
Sample
download.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
download.html
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
download
-
Size
2KB
-
MD5
8f37f574ece151d1e559d62ed80c46b2
-
SHA1
a1654ac0d1b62d819a8969e0ccd19ed801262c61
-
SHA256
2cc91a40bead49c68b92da489dd5bae6c59071335086cd266224211d53262137
-
SHA512
4a5b9e5c9510a88c4bcfbd4ef16400d119576c22d0437da8143bfa1d016a1ea21a5e56d358fefd19b15eee7154b81de59ab3944015b8c8a2d1828f4b1029b545
Score10/10-
PureLog Stealer payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-