General

  • Target

    https://gofile.io/d/ggazFm

  • Sample

    241215-q22fvaxpek

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7719105235:AAFOTAIFB9Rqu4XvnkM0TIOpafds3cZFXG0/sendMessag

https://api.telegram.org/bot7719105235:AAFOTAIFB9Rqu4XvnkM0TIOpafds3cZFXG0/sendDocumen

Targets

    • Target

      https://gofile.io/d/ggazFm

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks