Resubmissions

01-02-2025 12:45

250201-pzbxqsvlal 10

01-02-2025 12:44

250201-pyks9asmey 8

General

  • Target

    clear.rar

  • Size

    79KB

  • Sample

    250201-pzbxqsvlal

  • MD5

    d48f855ab685f45c2c775e504929e547

  • SHA1

    e3ab6da9e65ac042fd226590cfcef2407d7ac90a

  • SHA256

    07f8ecb6b5cba0b1594f52abf15aea38ca30b47e88fde0a30bfadc2987ed3a85

  • SHA512

    fa4f372147bc6458b7b32708665a1b633e0b9ce664a3978ce1b58cde6ee49c819094a968f370554ce2c39cd544049b8093aa119862b3178737d02405beb80457

  • SSDEEP

    1536:qwLUIWRKuqamoNybu883Jf7MP4BfPVdvSQJBLTFGEbafNQg/MEgyts1LOS7xC02S:qwL8KKNUu883x7LBTbuNQuHtq6YC0wq9

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7704662300:AAHZHv4I3t9TNk5ILgxvtKoFOJ0M5VPSSv8/sendPhot

Targets

    • Target

      clear.rar

    • Size

      79KB

    • MD5

      d48f855ab685f45c2c775e504929e547

    • SHA1

      e3ab6da9e65ac042fd226590cfcef2407d7ac90a

    • SHA256

      07f8ecb6b5cba0b1594f52abf15aea38ca30b47e88fde0a30bfadc2987ed3a85

    • SHA512

      fa4f372147bc6458b7b32708665a1b633e0b9ce664a3978ce1b58cde6ee49c819094a968f370554ce2c39cd544049b8093aa119862b3178737d02405beb80457

    • SSDEEP

      1536:qwLUIWRKuqamoNybu883Jf7MP4BfPVdvSQJBLTFGEbafNQg/MEgyts1LOS7xC02S:qwL8KKNUu883x7LBTbuNQuHtq6YC0wq9

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks