General
-
Target
0b80d7aea7acb5d4bd7e6dbfabeaf5529faec78ff5b29fc525edc2c8bf7e537c
-
Size
61KB
-
Sample
230923-zmpceacb39
-
MD5
4345b942eb187e2b867a6e9524d166e0
-
SHA1
1814c6a4205852069bbaaf9c8bd2809842d52548
-
SHA256
0b80d7aea7acb5d4bd7e6dbfabeaf5529faec78ff5b29fc525edc2c8bf7e537c
-
SHA512
85f5ecafcb711af6ace4ddb11ca3a8e8d2a4799ba07d258bb731d55dc36614139db760aeea6e1f1d3674bb045230ba9d247c13d895a7f3f85ea26967788a87d6
-
SSDEEP
1536:LAs/SNC8tMgVCYQc3FljTQ28SbW3Rw8eaCNOtQ20PmkK:LAB88tVnTQ28SbW3Rw8eaPtQ20+kK
Static task
static1
Behavioral task
behavioral1
Sample
0b80d7aea7acb5d4bd7e6dbfabeaf5529faec78ff5b29fc525edc2c8bf7e537c.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
0b80d7aea7acb5d4bd7e6dbfabeaf5529faec78ff5b29fc525edc2c8bf7e537c
-
Size
61KB
-
MD5
4345b942eb187e2b867a6e9524d166e0
-
SHA1
1814c6a4205852069bbaaf9c8bd2809842d52548
-
SHA256
0b80d7aea7acb5d4bd7e6dbfabeaf5529faec78ff5b29fc525edc2c8bf7e537c
-
SHA512
85f5ecafcb711af6ace4ddb11ca3a8e8d2a4799ba07d258bb731d55dc36614139db760aeea6e1f1d3674bb045230ba9d247c13d895a7f3f85ea26967788a87d6
-
SSDEEP
1536:LAs/SNC8tMgVCYQc3FljTQ28SbW3Rw8eaCNOtQ20PmkK:LAB88tVnTQ28SbW3Rw8eaPtQ20+kK
Score10/10-
Detect Gurcu Stealer V3 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-