Analysis
-
max time kernel
2s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 01:17
Behavioral task
behavioral1
Sample
t40bd50ace847a114b83265af91b7.exe
Resource
win7-20230831-en
windows7-x64
9 signatures
150 seconds
General
-
Target
t40bd50ace847a114b83265af91b7.exe
-
Size
315KB
-
MD5
302fb687c1912342845fe7aa4517754c
-
SHA1
4b38aa9b8cc0e9696c3d79ad057d9f1caad86c55
-
SHA256
7b2dea7a8eff410159459e3f89c5e4fa81f8b9d2f6ce02cfaf8e307f3adf9f85
-
SHA512
7f84eb441ed7b4e0296f37cc16015d96b9cf829648e46058248d3e7b731a443e2c549f07ba7632f49f12e44d6759efdc7ccadd184a87ac2aa19597d1263931da
-
SSDEEP
6144:8T9+O50zYvPAtwVj6XbeBuQdwLaA19bUUyFLa:84H8XQ3QdwLaZUWL
Malware Config
Extracted
Family
gurcu
C2
https://api.telegram.org/bot6237712604:AAESgAGfaQ0EUC8eWgMd7kpAW_FEGRDRfDs/sendMessage?chat_id=880824160
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3048 t40bd50ace847a114b83265af91b7.exe