General

  • Target

    NEAS.1edb8aa1adacda31bc98064b1634ddeabin_JC.zip

  • Size

    156KB

  • Sample

    231007-m3jqmsba7x

  • MD5

    138370815c888c4362068622ba4d3e5a

  • SHA1

    457c66bc68fcc429c0218399fb1b40a446b5daa7

  • SHA256

    372950be624691f21ea31e846fda46915ae437dc596fd43e7adce57d12acfde5

  • SHA512

    17c90595978c58197091ff97181699c597597f861e050f1ccd84ef89b3e547b4813137fcaf8b806e4167044455f4123ef3949637da26acc035ba8378bc43abee

  • SSDEEP

    3072:l8pSsqL+E/5hqnffddeUbQ7x9sK/7UYjEzCSM22YBwpmmgR722BGXOXhqLVe:lOZqLnxhqnCU07PsK/gY4CYOpzCC2BGY

Malware Config

Targets

    • Target

      fb33ecb0d51761b0bde6977c7ae7eec18fd4c326bd73f3f4fac32e9abfb18575.exe

    • Size

      225KB

    • MD5

      1edb8aa1adacda31bc98064b1634ddea

    • SHA1

      7dc5aee1dd577b61a41a5001d465f0606bb33618

    • SHA256

      fb33ecb0d51761b0bde6977c7ae7eec18fd4c326bd73f3f4fac32e9abfb18575

    • SHA512

      26601df19ed259e48ae9e5a792fdb814d216cae446da5f2518670c25df2111a8df69c8afd2059a49e3f2c84156bb4fa95c9106f348535eb79e29f436df42037a

    • SSDEEP

      3072:GQ2NGV19gqU3pJpfYTCOoShKmECPTKBWFPkl6WQre9Q29bSHXGhrD9HA2AF+q73o:uGDCOoSEmkWeILe9z9bS30AzHe0

    • Detect Gurcu Stealer V3 payload

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks