General

  • Target

    f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50.zip

  • Size

    272KB

  • Sample

    241206-qalw3svjcq

  • MD5

    d45f52bae20dc3c69d793b4e9cb8f1e4

  • SHA1

    4ad7751e41dd82248c36de9b8a07c3f8609a9747

  • SHA256

    27ba6d686db735916061498a56b3a43e4791ee455fabf4caed05db1929f28e6b

  • SHA512

    15adc0c154e591b47286b30cec0de5e278b02a19ce4458cb740b238dbcfc7a5115e83e898e3a925970e482f1b69dd92a8458f1024a7a92099526e5fda44082e0

  • SSDEEP

    6144:Lfb11rqzrdA5QHwWlAZfzRU/RQbTH6bk04YTLuyLk3ii:rb112zxHwCr/RQbT2k04CSok3F

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6104192483:AAFCcnr4FR2XCO83zUSAWWZ9J3qw4tRYQoI/sendMessage?chat_id=2076277850

Targets

    • Target

      f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50.exe

    • Size

      490KB

    • MD5

      a338043c6b5260df6b7ce4c4ec3d1b80

    • SHA1

      087a787a34ee05478bfa07b50fd39c8367b0a157

    • SHA256

      f7b02278a2310a2657dcca702188af461ce8450dc0c5bced802773ca8eab6f50

    • SHA512

      c81b2f1aac6d249d43b485e8e536c22a8f44da09e31f118f9ddfd0f1ef6d1eba4b67e96d087b2148f45dc93e0de5ba0178c422088e110a40544a7b3b2ff4fccf

    • SSDEEP

      6144:/6ho3IhHN5ya1R64TxT8jWHgf8YJkVHC++VeQPBZnq0LZYSwFxQx9tw39b5wGuJB:irhtHxpmWHgf8Y6/Qp1nLiDKIwf

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • A potential corporate email address has been identified in the URL: MJAHk_Admin@GUMLNLFE_report.wsr

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks