General

  • Target

    ce46c599ce044629569bfaef9e1373fb452c128309cf1fd7aed4c6fc5235c7b5.zip

  • Size

    971B

  • Sample

    240730-c1h18axelb

  • MD5

    e5259b6024621e100b418507ef79a7dd

  • SHA1

    075f2357c9f138ec55aab39888be36aad3daef59

  • SHA256

    ce46c599ce044629569bfaef9e1373fb452c128309cf1fd7aed4c6fc5235c7b5

  • SHA512

    2761e44034ca223deb297985731e48aa2fbc311db97ff0ec4115526d08e323f59a89b673b9e1c493a9104b9095d901e2143bebaae52f610b8675421dffa462b7

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7304169973:AAHQ-YM-Iz4Z3iwfTDSixExgl7INL8UlSEA/sendMessage?chat_id=6845150313

Targets

    • Target

      Catalog co.pdf.lnk

    • Size

      2KB

    • MD5

      eb248558c413ed59d5f85b05ecba8213

    • SHA1

      67b895b8372810fc71e4bc4b645225adff29239b

    • SHA256

      b9bb4eb13cb09c25862151e98059905804034304d4c65d9efe1f2ad0da38301a

    • SHA512

      215e64935fc7fd4ed15b85b96cf98871bbdd4cfd07f3cefaf89e9374709137a6136793f49182a0dfa3717e5418a7ebac47890ed5fd248f511804a81ef1671697

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks