General
-
Target
NEAS.1edb8aa1adacda31bc98064b1634ddeabin_JC.zip
-
Size
156KB
-
Sample
231007-m3jqmsba7x
-
MD5
138370815c888c4362068622ba4d3e5a
-
SHA1
457c66bc68fcc429c0218399fb1b40a446b5daa7
-
SHA256
372950be624691f21ea31e846fda46915ae437dc596fd43e7adce57d12acfde5
-
SHA512
17c90595978c58197091ff97181699c597597f861e050f1ccd84ef89b3e547b4813137fcaf8b806e4167044455f4123ef3949637da26acc035ba8378bc43abee
-
SSDEEP
3072:l8pSsqL+E/5hqnffddeUbQ7x9sK/7UYjEzCSM22YBwpmmgR722BGXOXhqLVe:lOZqLnxhqnCU07PsK/gY4CYOpzCC2BGY
Behavioral task
behavioral1
Sample
fb33ecb0d51761b0bde6977c7ae7eec18fd4c326bd73f3f4fac32e9abfb18575.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fb33ecb0d51761b0bde6977c7ae7eec18fd4c326bd73f3f4fac32e9abfb18575.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
fb33ecb0d51761b0bde6977c7ae7eec18fd4c326bd73f3f4fac32e9abfb18575.exe
-
Size
225KB
-
MD5
1edb8aa1adacda31bc98064b1634ddea
-
SHA1
7dc5aee1dd577b61a41a5001d465f0606bb33618
-
SHA256
fb33ecb0d51761b0bde6977c7ae7eec18fd4c326bd73f3f4fac32e9abfb18575
-
SHA512
26601df19ed259e48ae9e5a792fdb814d216cae446da5f2518670c25df2111a8df69c8afd2059a49e3f2c84156bb4fa95c9106f348535eb79e29f436df42037a
-
SSDEEP
3072:GQ2NGV19gqU3pJpfYTCOoShKmECPTKBWFPkl6WQre9Q29bSHXGhrD9HA2AF+q73o:uGDCOoSEmkWeILe9z9bS30AzHe0
Score10/10-
Detect Gurcu Stealer V3 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-