Do #PureLogs Stealer and #PureCrypter use the same C2 protocol, or is there some way to tell the C2 protocols apart?
C2 servers:
🔥 45.141.233.100:7708
🔥 144.172.91.74:7709
🔥 62.60.235.100:9100
🔥 65.108.24.103:62050
🔥 91.92.120.102:62050
🔥 192.30.240.242:62520

I ended an article a couple of months ago with:
> I may analyze the final payload in a future post.

And finally the day has come.
Spoiler: it was not the final payload.

Dissecting PureCrypter: A Technical Malware Analysis
https://0xlibris.net/posts/infection_chain_infostealer_2

#PureCrypter #malware #infosec #reversing #cybersecurity #infostealer #malwareanalysis

Dissecting PureCrypter: A Technical Malware Analysis – 0xlibris

Analyzing the Infection Chain of a Stealer Malware. Part 2

0xlibris

Good day everyone!

Cisco Talos brings us a HOT report on a new backdoor they observed in a widespread campaign that they dubbed #TorNet, owing to the fact that the actor connects the victim's machine to the TOR network for stealthy command and control (C2) communications and detection evasion.

Attack Summary:
The attack starts with a phishing email with a malicious attachment, which leads to a .NET loader executing and downloads the #PureCrypter malware, which is responsible for dropping and running the TorNet backdoor. After a successful connection to the C2 server it connects the victim's machine to the TOR network which enables it to receive and run arbitrary .NET assemblies in memory.

Behavior Summary:
Initial Access:
Phishing Email with Attachment - in this case, a .tgz (compressed file)

Defense Evasion
Released and renewed the ip address of the compromised machine - "cmd /c ipconfig /release" and "cmd /c ipconfig /renew"
Modifcaiton of the machine - "Add-MpPreference -ExclsuionPath" and "Add-MpPreference -ExclusionProcess"

Discovery:
WMI Activity - "Select * from Win32_BIOS" and "Select * from Win32_ComputerSystem"

Persistence:
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder - Dropped a VB script in the windows Startup folder

These are just some of the behaviors, for the rest, go and enjoy the read! Happy Hunting!

New TorNet backdoor seen in widespread campaign
https://blog.talosintelligence.com/new-tornet-backdoor-campaign/

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

New TorNet backdoor seen in widespread campaign

Cisco Talos discovered an ongoing malicious campaign operated by a financially motivated threat actor targeting users, predominantly in Poland and Germany.

Cisco Talos Blog

Campagne #Malware #Italy Week 24

☠️💣🔥👻
#AgentTesla: Preventivo
#Formbook: Bonifico
#StrRat: Spedizione
#Lumma - #Stealc: Setup
#Adwind: Documenti
#PureCrypter: Hotel

#mwitaly

An unknown threat group has been targeting government agencies in Asia Pacific and North America via abuse of the popular Discord network and a hijacked website belonging to a non-profit. The two-stage attacks include enticing victims to install the PureCrypter downloader, which then delivers a variety of possible malware payloads.
https://www.scmagazine.com/news/cybercrime/purecrypter-discord-target-govt #CyberSecurity #PureCrypter #Discord #NorthAmerica #APAC #government #targets
PureCrypter enlists Discord to target North American, APAC governments

PureCrypter used in targeted campaigns against government entities through Discord.

SC Media
Government entities in Asia-Pacific and North America are being targeted by an unknown threat actor with an off-the-shelf malware downloader known as PureCrypter to deliver an array of information stealers and ransomware.
https://thehackernews.com/2023/02/purecrypter-malware-targets-government.html #CyberSecurity #PureCrypter #malare #APAC #NorthAmerica
PureCrypter Malware Targets Government Entities in Asia-Pacific and North America

Government entities in Asia-Pacific and North America are being targeted with an off-the-shelf malware downloader known as PureCrypter.

The Hacker News
Researchers at #MenloSecurity have discovered that a threat actor is targeting government agencies in the Asia-Pacific and North American regions with the #PureCrypter #malware downloader. https://andreafortuna.org/2023/02/26/latest-purecrypter-campaign-targets-government-organisations #cybersecurity
Latest PureCrypter campaign targets government organisations

Researchers at Menlo Security have discovered that a threat actor is targeting government agencies in the Asia-Pacific and North American regions with the PureCrypter malware downloader.

Andrea Fortuna

📢 Watch out for PureCrypter malware targeting government entities through #Discord by delivering a wide range of other nasty #malware.

Details: https://www.hackread.com/purecrypter-malware-discord/

#Security #PureCrypter #Ransomware #Crypto

PureCrypter Malware Targets Governments Through Discord

Follow us on Twitter @HackRead - Facebook @ /HackRead

HackRead | Latest Cybersecurity and Hacking News Site
PureCrypter used to deliver AgentTesla to govt organizations

An unknown threat actor is targeting government organizations with the PureCrypter downloader, Menlo Security firm reported.  Menlo Labs researchers uncovered an unknown threat actor is using the PureCrypter downloader in attacks aimed at government entities. The campaign relies on the domain of a compromised non-profit organization as a C2 server to deliver a second-stage payload. […]

Security Affairs

I'M BAAAACK!

Og det er #CYBER2GO også!

Dagens 3 nyheder:

* #Microsoft integrerer #Edge #Secure #Network

* #NewsCorp udsat for #cyberangreb 2020-2022

* #PureCrypter - global indflydelse

Lyt med hvor du finder dine #podcasts eller på https://cyber2go.buzzsprout.com!

--
tags:
#cyber2go #cybersikkerhed #cybersec #cybersecurity #IT #teknik #fælleshjerne #dkmastodon

CYBER2GO

Alt det nye om cybersikkerhed rundt om i verden, på få minutter, alle hverdage – bragt af LEVEL7s vært Omar Hawwash, cybersikkerhedskonsulent og journalist.

Buzzsprout