General
-
Target
test.rar
-
Size
32.3MB
-
Sample
241218-ds1fzaskfq
-
MD5
bcceba879a34e34021ec86985b256039
-
SHA1
7948c9327d3f04da85a37c4d62ed2f8dfca56900
-
SHA256
894569cf4554d6b78e4cadebef076ea4b8a51d58d7307244a5acabf3beafb697
-
SHA512
845d10d3c002e198462a951e391b7cc00a790b0c7f339222b87e3df0418f7b8bae34688693b31c531f3f7138fd3620cd4ef37cc3a118d990f15116edf7e50b95
-
SSDEEP
786432:Us6yVAZZQH0evs7z9kyVbOIuL0x4yI3mgz58pGoOAcHS:Uz+Y7z+yVi4qyItdgLH
Static task
static1
Behavioral task
behavioral1
Sample
test.rar
Resource
win10v2004-20241007-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=2024893777&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=2024893777
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=2024893777&caption=%F0%9F%93%B8Screenshot%20take
Targets
-
-
Target
test.rar
-
Size
32.3MB
-
MD5
bcceba879a34e34021ec86985b256039
-
SHA1
7948c9327d3f04da85a37c4d62ed2f8dfca56900
-
SHA256
894569cf4554d6b78e4cadebef076ea4b8a51d58d7307244a5acabf3beafb697
-
SHA512
845d10d3c002e198462a951e391b7cc00a790b0c7f339222b87e3df0418f7b8bae34688693b31c531f3f7138fd3620cd4ef37cc3a118d990f15116edf7e50b95
-
SSDEEP
786432:Us6yVAZZQH0evs7z9kyVbOIuL0x4yI3mgz58pGoOAcHS:Uz+Y7z+yVi4qyItdgLH
Score10/10-
Gurcu family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1