General
-
Target
b327cefae6707c649804ba89518e9690N.exe
-
Size
273KB
-
Sample
240825-f5gkqsxaqb
-
MD5
b327cefae6707c649804ba89518e9690
-
SHA1
0a9f7bd8b51d61288cf253a186693f38299bbfb5
-
SHA256
2a196a394b6f73d6e9dafe6205c6507802d50d21de2d715ff512c2c2e4b6531c
-
SHA512
670a1a0db9bcac41e3f0d16992a920232d22e69dbadecffc542990550557ec72f0d2100790fdda3c1645bee339f6a0ce79ae0a3fa5ef590eb882279c5dd815a8
-
SSDEEP
3072:MsC1JX9HSPBKYyuXu8Hzj5v5fOj/1tleVKCKxLD8O:fC/X9yPBFpu8TyxeVKdtD8
Behavioral task
behavioral1
Sample
b327cefae6707c649804ba89518e9690N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b327cefae6707c649804ba89518e9690N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b327cefae6707c649804ba89518e9690N.exe
-
Size
273KB
-
MD5
b327cefae6707c649804ba89518e9690
-
SHA1
0a9f7bd8b51d61288cf253a186693f38299bbfb5
-
SHA256
2a196a394b6f73d6e9dafe6205c6507802d50d21de2d715ff512c2c2e4b6531c
-
SHA512
670a1a0db9bcac41e3f0d16992a920232d22e69dbadecffc542990550557ec72f0d2100790fdda3c1645bee339f6a0ce79ae0a3fa5ef590eb882279c5dd815a8
-
SSDEEP
3072:MsC1JX9HSPBKYyuXu8Hzj5v5fOj/1tleVKCKxLD8O:fC/X9yPBFpu8TyxeVKdtD8
-
PureLog Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1