General
-
Target
7b271f5de5b2fbb7b2dada7b93ea925b199bbef2462f527409ae62249c1d102d
-
Size
7.2MB
-
Sample
240416-qw8yqsch91
-
MD5
318b2f34fe665928280456b1d22c0390
-
SHA1
12b169796c8974eef2907b0e0f856896063484ad
-
SHA256
7b271f5de5b2fbb7b2dada7b93ea925b199bbef2462f527409ae62249c1d102d
-
SHA512
2a1a67016f7c183b7821df4518e0ca45c74232ac2638fe9ee8aca7781d883bbfca8ee955aa66810ae202e56138585b69b7ab3a43cbf9a07a90ad0bf8e69430c3
-
SSDEEP
6144:rGnJDaCOoSEmkWeILer9bqKuFkB20VzcgcLIa:caCOfVkWeAeMHFkVV6LIa
Behavioral task
behavioral1
Sample
7b271f5de5b2fbb7b2dada7b93ea925b199bbef2462f527409ae62249c1d102d.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
7b271f5de5b2fbb7b2dada7b93ea925b199bbef2462f527409ae62249c1d102d.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
7b271f5de5b2fbb7b2dada7b93ea925b199bbef2462f527409ae62249c1d102d.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
7b271f5de5b2fbb7b2dada7b93ea925b199bbef2462f527409ae62249c1d102d.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
7b271f5de5b2fbb7b2dada7b93ea925b199bbef2462f527409ae62249c1d102d.exe
Resource
win11-20240412-en
Malware Config
Targets
-
-
Target
7b271f5de5b2fbb7b2dada7b93ea925b199bbef2462f527409ae62249c1d102d
-
Size
7.2MB
-
MD5
318b2f34fe665928280456b1d22c0390
-
SHA1
12b169796c8974eef2907b0e0f856896063484ad
-
SHA256
7b271f5de5b2fbb7b2dada7b93ea925b199bbef2462f527409ae62249c1d102d
-
SHA512
2a1a67016f7c183b7821df4518e0ca45c74232ac2638fe9ee8aca7781d883bbfca8ee955aa66810ae202e56138585b69b7ab3a43cbf9a07a90ad0bf8e69430c3
-
SSDEEP
6144:rGnJDaCOoSEmkWeILer9bqKuFkB20VzcgcLIa:caCOfVkWeAeMHFkVV6LIa
Score10/10-
Detect Gurcu Stealer V3 payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-