PureCrypter is actively being developed by a threat actor using the moniker “PureCoder”.
PureCrypter’s first-stage is a simple downloader. In this example, the downloader was disguised as a fake date console application.
The application secretly downloads a .NET assembly from a command and control server in order to bypass security products. The bytes of the assembly are completely reversed and this same technique is used across PureCrypter’s different stages. The second-stage filename typically has a fake extension such as “jpg”, “png” or “log” and/or a legitimate-looking filename.
The second-stage payload is a more sophisticated piece of code and the core component of PureCrypter. On top of that, the .NET assembly is obfuscated with the commercial tool SmartAssembly.
As part of the SmartAssembly’s obfuscation, the module entrypoint first adds an assembly and a resource resolver. An extra assembly resolver is added to handle compressed and/or encrypted data. Basically, when an assembly is referenced the resolver will capture that event and try to load the assembly from its resources.
The main function of the PureCrypter injector starts by reversing, decompressing (gunzip) and deserializing an object into the following protocol buffer (protobuf).
The author of PureCrypter provided an option to send an infection status message on a Discord channel. Using the the DiscordWebHookUrl parameter, the malware can send the dictionary in Table 3 via the WebClient:UploadValues method over TLS 1.2.
New variants of the malware can send a similar message to the author via Telegram. The URL is constructed as follows:
https://api.telegram.org/bot + protobuf_configuration.TelegramToken + /sendMessage?chat_id= + protobuf_configuration.TelegramID.
The message is sent via WebClient:DownloadString over TLS 1.2
Given the StartupSettings members, the PureCrypter injector can achieve persistence using different methods.
Firstly, it takes the Location member as a parameter to the Environment.GetFolderPath method. In this case, it retrieves the %APPDATA% folder and appends the value of the FileName member to it.
The EnumStartup field indicates how to install the malware on the system.
The PureCrypter developer provides three different ways to run the associated malware, which is given by the EnumInjection member. However, all of them retrieve the embedded malicious payload by decompressing and reversing one of the resources mentioned earlier.
The process hollowing technique is pretty classic and comes in 32 and 64-bit flavors.
PureCrypter starts by creating a suspended process via CreateProcessA(). The command-line argument is built by concatenating the result of GetRuntimeDirectory(), the InjectionPath and an “.exe” extension. If the CommandLine struct member is set, then it is also concatenated. The remote process memory is unmapped via ZwUnmapViewOfSection() and the associated malware is written to the process memory and executed.
The injector can also run the embedded resource inside its own process by creating a shellcode.
The last way the PureCrypter injector can run its payload is by loading the resource as an assembly and invoking its entrypoint.
Extra Anti-* functionalities
Some methods that don’t seem to be referenced, but still are quite interesting in terms of environment detection are the following:
Queries the WMI object Win32_BIOS for the computer’s SerialNumber and Version and checks if it matches the regular expression “VMware|VIRTUAL|A M I|Xen”
Queries the WMI object Win32_ComputerSystem for the computer’s Manufacturer and Model and checks if it matches the regular expression “Microsoft|VMWare|Virtual”
Checks for the presence of “SbieDLL.dll” module
Checks specific resolutions of the display monitor
The sample delivers a SnakeKeylogger variant.
This malware family is just one of many payloads observed by ThreatLabz that is injected via a process hollowing technique
Sign Up For Threat Alerts
Jun 30, 2022
YTStealer Malware: YouTube Cookies! Om Nom Nom...
The Dark Web Market for YouTube Account Access In 2006, the term "data is the...
Jun 27, 2022
Bronze starlight Ransomware Operations Use HUI Loader
The BRONZE RIVERSIDE threat group is likely responsible for stealing intellectual property from Japanese organizations....
Jun 27, 2022
The Black Basta ransomware is a new...
Although active for just two months, the group already rose to prominence claiming attribution of...
Jun 27, 2022
Gallium APT Group
Researchers from Palo Alto Networks defined the PingPull RAT as a "difficult-to-detect" backdoor that leverages...
Jun 26, 2022
US Cert Alert – Malicious Cyber Actors...
The Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard Cyber Command (CGCYBER)...
Jun 23, 2022
Matanbuchus: Malware-as-a-Service with Demonic Intentions
A new malware-as-a-service (MaaS) called Matanbuchus Loader was discovered in underground markets by Unit42. Malware...
Jun 22, 2022
Websites Hosting Fake Cracks Spread Updated CopperStealer...
Analysts noticed a new version of CopperStealer and analyzed these samples to be related to...
Jun 21, 2022
Symbiote Deep-Dive: Analysis of a New, Nearly-Impossible-to-Detect...
Symbiote is a shared object (SO) library that is loaded into all running processes using...
Jun 19, 2022
HelloXD Ransomware Installing Backdoor on Targeted Systems
Systems are being targeted by a ransomware variant called HelloXD, with the infections also involving...
Jun 16, 2022
Panchan’s Mining Rig: New Golang Peer-to-Peer Botnet
Akamai security researchers discovered Panchan, a new peer-to-peer botnet and SSH worm that emerged in...
Jun 14, 2022
CERT-IL Alert: an active phishing campaign in...
Recently new information was passed to the CERT-IL team indicating that there is an active...
Jun 13, 2022
Follina suspected state aligned phishing campaign
Proofpoint blocked a suspected state aligned phishing campaign targeting European gov & local US gov...
Jun 09, 2022
Newly-Discovered Chinese-linked APT Has Been Quietly Spying...
Cado Labs regularly analyses attacks targeting services running within a honeypot infrastructure. One recent attack...
Jun 08, 2022
Active Exploitation of Confluence CVE-2022-26134
Atlassian published a security advisory for CVE-2022-26134, a critical unauthenticated remote code execution vulnerability in...
Jun 07, 2022
Msiexec Impersonation – Exploit Leads to Data...
In this multi-day intrusion, The DFIR Report observed a threat actor gain initial access to...