General
-
Target
BOUNTY_FREE.exe
-
Size
4.3MB
-
Sample
250108-vffdpswmev
-
MD5
8ac2d675aca9c0d6837fdaf06da9d441
-
SHA1
2843ab6f217fdd652ea3ca5869df94cc17a8bfd0
-
SHA256
1db6a3913e7a0d08dde8cad8c1af9db94334b96020fc0ec035d9c77fa61e875e
-
SHA512
7b2247aa0dee3c51f165f5bffd11c00551921323c6ff09bc46b54ff3e7957c2c54c6517c914bdde4e3b8a7dbeb68d05abbd4a8400955fc0af0cdae53c9b69562
-
SSDEEP
98304:aqBdvTCa5zayzLu36rQAHGtx+zmBM1vXqtViWaz2eXjb/z2:tTJDaqrQAmtx+mu1vXqtViWDWa
Behavioral task
behavioral1
Sample
BOUNTY_FREE.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
BOUNTY_FREE.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
purecrypter
https://cdn.discordapp.com/attachments/1014517792986378343/1022788605682397214/moddedvgc_Dxtgnmlu.bmp
Targets
-
-
Target
BOUNTY_FREE.exe
-
Size
4.3MB
-
MD5
8ac2d675aca9c0d6837fdaf06da9d441
-
SHA1
2843ab6f217fdd652ea3ca5869df94cc17a8bfd0
-
SHA256
1db6a3913e7a0d08dde8cad8c1af9db94334b96020fc0ec035d9c77fa61e875e
-
SHA512
7b2247aa0dee3c51f165f5bffd11c00551921323c6ff09bc46b54ff3e7957c2c54c6517c914bdde4e3b8a7dbeb68d05abbd4a8400955fc0af0cdae53c9b69562
-
SSDEEP
98304:aqBdvTCa5zayzLu36rQAHGtx+zmBM1vXqtViWaz2eXjb/z2:tTJDaqrQAmtx+mu1vXqtViWDWa
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Purecrypter family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-