General
-
Target
Output.exe
-
Size
22.1MB
-
Sample
250121-yj3vysyket
-
MD5
cd348179244167083c704754e338418b
-
SHA1
14b336e1a1b6d044d298e3a63b0617b2cb6ade8a
-
SHA256
38a988e6fe88aa893cb28797a54153e7f2de8688b4e908edcaa6ffebcd72b9e9
-
SHA512
b58995e445056e8a9d76395467160d56608b67ab0a04641f6b5f73546793880facc4479ec1662648cfe8d394288ffda5270445452e7742872958f76a5d1c9a43
-
SSDEEP
393216:yx/1Iko48uNHJohfQ4jsl1efcbzP3DCDVimIX0LAKt0rCAc:yx/138qWn42fUDC/iLWAc
Static task
static1
Behavioral task
behavioral1
Sample
Output.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8173512948:AAGBtWAKwGvAy49MjeMJTGmkJFfofJmU7DI/sendDocument?chat_id=-4752223198&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot8173512948:AAGBtWAKwGvAy49MjeMJTGmkJFfofJmU7DI/sendMessage?chat_id=-4752223198
https://api.telegram.org/bot8173512948:AAGBtWAKwGvAy49MjeMJTGmkJFfofJmU7DI/getUpdates?offset=-
https://api.telegram.org/bot8173512948:AAGBtWAKwGvAy49MjeMJTGmkJFfofJmU7DI/sendDocument?chat_id=-4752223198&caption=%F0%9F%93%B8Screenshot%20take
https://api.telegram.org/bot8173512948:AAGBtWAKwGvAy49MjeMJTGmkJFfofJmU7DI/sendDocument?chat_id=-4752223198&caption=%E2%9C%85Files%20uploade
Targets
-
-
Target
Output.exe
-
Size
22.1MB
-
MD5
cd348179244167083c704754e338418b
-
SHA1
14b336e1a1b6d044d298e3a63b0617b2cb6ade8a
-
SHA256
38a988e6fe88aa893cb28797a54153e7f2de8688b4e908edcaa6ffebcd72b9e9
-
SHA512
b58995e445056e8a9d76395467160d56608b67ab0a04641f6b5f73546793880facc4479ec1662648cfe8d394288ffda5270445452e7742872958f76a5d1c9a43
-
SSDEEP
393216:yx/1Iko48uNHJohfQ4jsl1efcbzP3DCDVimIX0LAKt0rCAc:yx/138qWn42fUDC/iLWAc
-
Gurcu family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1