General
-
Target
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50.zip
-
Size
272KB
-
Sample
241206-qalw3svjcq
-
MD5
d45f52bae20dc3c69d793b4e9cb8f1e4
-
SHA1
4ad7751e41dd82248c36de9b8a07c3f8609a9747
-
SHA256
27ba6d686db735916061498a56b3a43e4791ee455fabf4caed05db1929f28e6b
-
SHA512
15adc0c154e591b47286b30cec0de5e278b02a19ce4458cb740b238dbcfc7a5115e83e898e3a925970e482f1b69dd92a8458f1024a7a92099526e5fda44082e0
-
SSDEEP
6144:Lfb11rqzrdA5QHwWlAZfzRU/RQbTH6bk04YTLuyLk3ii:rb112zxHwCr/RQbT2k04CSok3F
Behavioral task
behavioral1
Sample
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50.exe
Resource
win7-20240903-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6104192483:AAFCcnr4FR2XCO83zUSAWWZ9J3qw4tRYQoI/sendMessage?chat_id=2076277850
Targets
-
-
Target
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50.exe
-
Size
490KB
-
MD5
a338043c6b5260df6b7ce4c4ec3d1b80
-
SHA1
087a787a34ee05478bfa07b50fd39c8367b0a157
-
SHA256
f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50
-
SHA512
c81b2f1aac6d249d43b485e8e536c22a8f44da09e31f118f9ddfd0f1ef6d1eba4b67e96d087b2148f45dc93e0de5ba0178c422088e110a40544a7b3b2ff4fccf
-
SSDEEP
6144:/6ho3IhHN5ya1R64TxT8jWHgf8YJkVHC++VeQPBZnq0LZYSwFxQx9tw39b5wGuJB:irhtHxpmWHgf8Y6/Qp1nLiDKIwf
-
Gurcu family
-
A potential corporate email address has been identified in the URL: MJAHk_Admin@GUMLNLFE_report.wsr
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1