Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-04-2023 13:30
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
77KB
-
MD5
10f57aeea7d69c1fd26302daea446d8d
-
SHA1
a2c2b246233565b7deade7a4e27b9bf521cdb714
-
SHA256
e890b9a76c6f9b47913ad5102fd668b556234c6be3488580577a03ed3f61b62c
-
SHA512
a28fc863f62f48fa26810ae7c099b03fc85b0d2542b3491aa2b5afb54df1114f415636f0ff048d3a8e0d158ff6378403a60c1ad3e3270c49e06ffea85da2ccb4
-
SSDEEP
768:oGJtwP79DfSNRjXkUs/2PC0UjobHXyZ3Bs9naW+9SLQ:9J+P7RKNRjXkUs/2KrUbHes9a3SLQ
Malware Config
Extracted
Family
gurcu
C2
https://api.telegram.org/bot6125631937:AAHzA1e2kkAXSFSX6lSoyDACqaM80kXHnEw/sendMessage?chat_id=6155788902
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1320 tmp.exe