Resubmissions

10-04-2024 02:49

240410-da1n1sfe7v 10

10-04-2024 02:49

240410-daz3gscc34 10

10-04-2024 02:48

240410-dazfyscc32 10

10-04-2024 02:48

240410-dayvesfe7s 10

14-10-2023 03:45

231014-ea62gage69 10

General

  • Target

    B9a5797cb584014f3fede.exe

  • Size

    530KB

  • Sample

    240410-dayvesfe7s

  • MD5

    862e7aeb18ba5892f51b5712a213a614

  • SHA1

    99d86e4247f52c3ea9b2bb476af66dfc7707fa8d

  • SHA256

    44eca198c64197c511441f644895afd6a2777c28bcb6a376d4d4623b030ced31

  • SHA512

    678fc8fb5dc887f41db90e6341229ce35c830ffac4cbb91ea669ab5e8bc849bae05c15909ae62e4dfd3a249bb2ff062eaa0e256989fe203863db0396c60ec713

  • SSDEEP

    6144:XHClm6SWPoK5Z0EwVSmRPQd/t/a2zDGVPJXvnzZjDJHb571Kjn1929XDccHd8JyO:XHCnZxb88RatpvnzZjDv7oj19yTNTY

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6176004110:AAFKA5be4dMwA848HWxzYIzrzzOGIHMOJGc/sendMessage?chat_id=615133582

Targets

    • Target

      B9a5797cb584014f3fede.exe

    • Size

      530KB

    • MD5

      862e7aeb18ba5892f51b5712a213a614

    • SHA1

      99d86e4247f52c3ea9b2bb476af66dfc7707fa8d

    • SHA256

      44eca198c64197c511441f644895afd6a2777c28bcb6a376d4d4623b030ced31

    • SHA512

      678fc8fb5dc887f41db90e6341229ce35c830ffac4cbb91ea669ab5e8bc849bae05c15909ae62e4dfd3a249bb2ff062eaa0e256989fe203863db0396c60ec713

    • SSDEEP

      6144:XHClm6SWPoK5Z0EwVSmRPQd/t/a2zDGVPJXvnzZjDJHb571Kjn1929XDccHd8JyO:XHCnZxb88RatpvnzZjDv7oj19yTNTY

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks