General
-
Target
Major_0x00012BD4C3BDF0(1).exe
-
Size
1.3MB
-
Sample
240729-vy912avfke
-
MD5
c7ea74a05e864d4d67a2fba6be3bb667
-
SHA1
be91a12de06e01a7e10b1dd514dbedb699f180e4
-
SHA256
a01ac4244102e3958296c70d71e3d951f11abcc355458d1918d081587b151d90
-
SHA512
ad03970be59ae08deaf69ffe3078704f9471a76789c040d695a21ab4ffd95377137ab64f19e33f6d9a9fa1b4ec11bd1c66b4a5bbc55dc413cd79aa6376b6a713
-
SSDEEP
24576:fWljizSawkL2zmeaAit8v1hUw+hqPNKLkFh:+l2akSz+AitK5EAF
Static task
static1
Behavioral task
behavioral1
Sample
Major_0x00012BD4C3BDF0(1).exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Major_0x00012BD4C3BDF0(1).exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7304169973:AAHQ-YM-Iz4Z3iwfTDSixExgl7INL8UlSEA/sendMessage?chat_id=6845150313
Targets
-
-
Target
Major_0x00012BD4C3BDF0(1).exe
-
Size
1.3MB
-
MD5
c7ea74a05e864d4d67a2fba6be3bb667
-
SHA1
be91a12de06e01a7e10b1dd514dbedb699f180e4
-
SHA256
a01ac4244102e3958296c70d71e3d951f11abcc355458d1918d081587b151d90
-
SHA512
ad03970be59ae08deaf69ffe3078704f9471a76789c040d695a21ab4ffd95377137ab64f19e33f6d9a9fa1b4ec11bd1c66b4a5bbc55dc413cd79aa6376b6a713
-
SSDEEP
24576:fWljizSawkL2zmeaAit8v1hUw+hqPNKLkFh:+l2akSz+AitK5EAF
-
Babbleloader family
-
Detects BabbleLoader Payload
-
Gurcu family
-
A potential corporate email address has been identified in the URL: ISL1n_Admin@ONNGJIJU_report.wsr
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1