General

  • Target

    system32.dll.exe

  • Size

    11.7MB

  • Sample

    241219-flmbwazpgm

  • MD5

    61436a5727d36c7e874181a08ae69b2e

  • SHA1

    a8622ec1b7bf5fd040bc1768133c8ee2c8e79acc

  • SHA256

    251d4a1307fb42d38c24b58f534a06906d0a89ef6f11daf625d9e2feaccb5ca5

  • SHA512

    ca4072766b860ac8216ecbd905b25139ad8ef7ac3222e0ca99ef38d39cc4a6b96e43a77a5d11f2b3fc21723bbdf79931fe5417864c43ad2a2a2286a89a1a1b3c

  • SSDEEP

    196608:bgjFnMsTXsvnox3g6W+QRO+KU8oTtoS3darE/W5FfUF/Z0RUSDBD9DsyKJbtYxn:UxnMsTXsvoRgX+joZB7+fk/rkBebSn

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8137934554:AAFOeSb9oJjQx7sEfNVTiItYJefxeHOSueA/sendDocument?chat_id=-4683258951&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb

https://api.telegram.org/bot8137934554:AAFOeSb9oJjQx7sEfNVTiItYJefxeHOSueA/sendMessage?chat_id=-4683258951

https://api.telegram.org/bot8137934554:AAFOeSb9oJjQx7sEfNVTiItYJefxeHOSueA/getUpdates?offset=-

https://api.telegram.org/bot8137934554:AAFOeSb9oJjQx7sEfNVTiItYJefxeHOSueA/sendDocument?chat_id=-4683258951&caption=%F0%9F%93%B8Screenshot%20take

Targets

    • Target

      system32.dll.exe

    • Size

      11.7MB

    • MD5

      61436a5727d36c7e874181a08ae69b2e

    • SHA1

      a8622ec1b7bf5fd040bc1768133c8ee2c8e79acc

    • SHA256

      251d4a1307fb42d38c24b58f534a06906d0a89ef6f11daf625d9e2feaccb5ca5

    • SHA512

      ca4072766b860ac8216ecbd905b25139ad8ef7ac3222e0ca99ef38d39cc4a6b96e43a77a5d11f2b3fc21723bbdf79931fe5417864c43ad2a2a2286a89a1a1b3c

    • SSDEEP

      196608:bgjFnMsTXsvnox3g6W+QRO+KU8oTtoS3darE/W5FfUF/Z0RUSDBD9DsyKJbtYxn:UxnMsTXsvoRgX+joZB7+fk/rkBebSn

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • MilleniumRat

      MilleniumRat is a remote access trojan written in C#.

    • Milleniumrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks