General

  • Target

    BoostrapperV3.exe

  • Size

    64.2MB

  • Sample

    240809-zybwfsygpq

  • MD5

    49e2f70f0baa0f20515e0963214711e3

  • SHA1

    f5fd3d8f31a21641bde133abfadcff62bc2c81a9

  • SHA256

    873e9a0d9a17a18b1da836449e9be94a3a71c8c0fd20833cceba86b360a1b896

  • SHA512

    e7df989a0f3a0b3f4a950930082f9c9e96451a7ddbdb1884f36c68ea514edf6b09d46f448757ddf6f6b3f05b2b8bc0d9a1650439478ed0b84c51686f36cc4e78

  • SSDEEP

    1572864:FVqXyvPluz7Tvtmq3D4lS9J3q6y7M1jv78MHKE:bTvPluTZsSrM7iRh

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot5687152406:AAFin_LYFhJGLydMgYheeUDec-2orew51aM/sendMessage?chat_id=2024893777

https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/sendDocument?chat_id=2024893777&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0%20kb)%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%84%20-%20BrowserDownloads.txt%20(1.27%20kb

https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/sendMessage?chat_id=2024893777

https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/getUpdates?offset=-

https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/sendDocument?chat_id=2024893777&caption=%F0%9F%93%B8Screenshot%20take

Targets

    • Target

      BoostrapperV3.exe

    • Size

      64.2MB

    • MD5

      49e2f70f0baa0f20515e0963214711e3

    • SHA1

      f5fd3d8f31a21641bde133abfadcff62bc2c81a9

    • SHA256

      873e9a0d9a17a18b1da836449e9be94a3a71c8c0fd20833cceba86b360a1b896

    • SHA512

      e7df989a0f3a0b3f4a950930082f9c9e96451a7ddbdb1884f36c68ea514edf6b09d46f448757ddf6f6b3f05b2b8bc0d9a1650439478ed0b84c51686f36cc4e78

    • SSDEEP

      1572864:FVqXyvPluz7Tvtmq3D4lS9J3q6y7M1jv78MHKE:bTvPluTZsSrM7iRh

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Gurcu, WhiteSnake

      Gurcu is a malware stealer written in C#.

    • Async RAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks