General

  • Target

    7d1850d00f469a99e922c4806ee971bb86b97e07ec585ef98536bed6db3b6c29N.exe

  • Size

    5.6MB

  • Sample

    241206-se25zaynhp

  • MD5

    20c1c110a69ba6dc9fb55a1186334290

  • SHA1

    7b35f156d8ef02936af990349d35efd7146380f2

  • SHA256

    7d1850d00f469a99e922c4806ee971bb86b97e07ec585ef98536bed6db3b6c29

  • SHA512

    08eb3ff63e09c6d236ceac3c006c844c48f283c266e8b3fa25ec1ee04d2eca49ec4788534e1ee55749de5ad89ddfa0dbbafa4eb9f30f35cdd783da08a2ad5d10

  • SSDEEP

    98304:aGl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Uc:adOuK6mn9NzgMoYkSIvUcwti7TQlvciE

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7912788699:AAGD1HW4P2288HKKYEhpShtetd37D8GqFZo/sendDocument?chat_id=7781867830&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20181.215.176.83%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan

Targets

    • Target

      7d1850d00f469a99e922c4806ee971bb86b97e07ec585ef98536bed6db3b6c29N.exe

    • Size

      5.6MB

    • MD5

      20c1c110a69ba6dc9fb55a1186334290

    • SHA1

      7b35f156d8ef02936af990349d35efd7146380f2

    • SHA256

      7d1850d00f469a99e922c4806ee971bb86b97e07ec585ef98536bed6db3b6c29

    • SHA512

      08eb3ff63e09c6d236ceac3c006c844c48f283c266e8b3fa25ec1ee04d2eca49ec4788534e1ee55749de5ad89ddfa0dbbafa4eb9f30f35cdd783da08a2ad5d10

    • SSDEEP

      98304:aGl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Uc:adOuK6mn9NzgMoYkSIvUcwti7TQlvciE

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks