MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d060ee3029a154a6fba6ed666ee5fafb2c8ee019dcfde0819f8aa24392b6e944. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PureCrypter


Vendor detections: 10


Intelligence 10 IOCs YARA 6 File information Comments

SHA256 hash: d060ee3029a154a6fba6ed666ee5fafb2c8ee019dcfde0819f8aa24392b6e944
SHA3-384 hash: b11288ee2e80768a4131918aa5ea483543c9fe965a17a4d98ad97421a2d73302c6c64312e35d2b63b7ec95b2ff6d1aa1
SHA1 hash: 8b801c2d83b7602d350734bc3de5de7b9df73436
MD5 hash: 49884eec4a8dcafe6d2993865154cdf4
humanhash: berlin-helium-bulldog-louisiana
File name:Setup.exe
Download: download sample
Signature PureCrypter
File size:2'654'496 bytes
First seen:2023-01-26 00:54:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'737 x AgentTesla, 19'596 x Formbook, 12'240 x SnakeKeylogger)
ssdeep 49152:V2+9WCvHTdprm74MntR2XTw5lKX0Zu04iXgIHuxCt8DccbasI:V2p2Td9mVtR2XTol80Zu04iXgHI8DM
Threatray 1'244 similar samples on MalwareBazaar
TLSH T12AC5335CFA8AFD12FE5904348550412863A2DD279AC3EE169982B7BD2C733C3C91977B
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon e9e2eae6b696c6ec (11 x LummaStealer, 4 x Vidar, 2 x FickerStealer)
Reporter malware_traffic
Tags:exe purecrypter

Intelligence


File Origin
# of uploads :
1
# of downloads :
219
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Setup.exe
Verdict:
Malicious activity
Analysis date:
2023-01-26 00:49:34 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
Sending an HTTP GET request
Reading critical registry keys
Sending a custom TCP request
Changing a file
Creating a file in the %AppData% subdirectories
Creating a window
Running batch commands
Creating a process with a hidden window
Launching a process
Stealing user critical data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm obfuscated overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
Found evasive API chain (may stop execution after checking locale)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Self deletion via cmd or bat file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Yara detected Costura Assembly Loader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Casdet
Status:
Malicious
First seen:
2023-01-26 00:55:09 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
14 of 26 (53.85%)
Threat level:
  5/5
Result
Malware family:
purecrypter
Score:
  10/10
Tags:
family:purecrypter discovery downloader loader spyware
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Downloads MZ/PE file
Detect PureCrypter injector
PureCrypter
Unpacked files
SH256 hash:
055c86cbc9468f071be17ce1d7ced18af86eb476e03ec81256af82c6c75228f3
MD5 hash:
41fd07d9881432c39046c606a4067c52
SHA1 hash:
c0b14d125ea5f94ed60587c72e48337f8e2043a2
SH256 hash:
230af5c1f43fc1bc4b150bcae07dc00e6995ba769cd7c2748c670b4d22383402
MD5 hash:
65a491f3372db7accd1a14734f87bfdf
SHA1 hash:
4a2e4e830bdf9724bd4b0824a3169c3844ded966
SH256 hash:
701fe4377f85c0cd3d14f44d51e54b8e877f3acb4bd5c465fe23ae78f705952d
MD5 hash:
a35a72f5291085823d2b0eb3e0b5b20d
SHA1 hash:
3d0d5e65185849ad7abee8a96b5fc03839744c18
SH256 hash:
d060ee3029a154a6fba6ed666ee5fafb2c8ee019dcfde0819f8aa24392b6e944
MD5 hash:
49884eec4a8dcafe6d2993865154cdf4
SHA1 hash:
8b801c2d83b7602d350734bc3de5de7b9df73436
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File
Author:ditekSHen
Description:Detects executables containing bas64 encoded gzip files
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments