Resubmissions

10-04-2024 02:52

240410-dcqxlaff2v 10

10-04-2024 02:52

240410-dcqltscc72 10

10-04-2024 02:51

240410-dcm6pscc67 10

10-04-2024 02:51

240410-dcmj6scc66 10

14-10-2023 04:10

231014-erhp7sga6y 10

General

  • Target

    f21559ac7c67d871d4f05.exe

  • Size

    327KB

  • Sample

    240410-dcmj6scc66

  • MD5

    78fd6df30f791c7b5f45dca0b4c952a5

  • SHA1

    d977ca82da0850eb5d4e69c9c657d1a41fb9c44d

  • SHA256

    dba8f020ac6d09728422932492657fea3f0a95754cd279f5a949b6982bd32129

  • SHA512

    abf0efb2412c522fbb7f6725a548e8d6a8bc045801a4dd8652a544a1527b99647140ad4843c41a6b00a728a5d8361c7e2ea80eba8ee3b291238729277dad228d

  • SSDEEP

    6144:Vc6sWfGY/yODx332tOIXlU1QWZxXAnuHW9bbGDwVdqe1mM:Ps+CXIAuGG8dA

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot5968091729:AAHVag_ncx5c5AIYERGTqv9kr7clJT1_HDU/sendMessage?chat_id=-1001962300376

Targets

    • Target

      f21559ac7c67d871d4f05.exe

    • Size

      327KB

    • MD5

      78fd6df30f791c7b5f45dca0b4c952a5

    • SHA1

      d977ca82da0850eb5d4e69c9c657d1a41fb9c44d

    • SHA256

      dba8f020ac6d09728422932492657fea3f0a95754cd279f5a949b6982bd32129

    • SHA512

      abf0efb2412c522fbb7f6725a548e8d6a8bc045801a4dd8652a544a1527b99647140ad4843c41a6b00a728a5d8361c7e2ea80eba8ee3b291238729277dad228d

    • SSDEEP

      6144:Vc6sWfGY/yODx332tOIXlU1QWZxXAnuHW9bbGDwVdqe1mM:Ps+CXIAuGG8dA

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks