Resubmissions

05-02-2025 17:47

250205-wc29qsxlat 10

05-02-2025 17:01

250205-vjss7sxpan 10

General

  • Target

    DeltaLoader.exe

  • Size

    44KB

  • Sample

    250205-vjss7sxpan

  • MD5

    50197e452db64d2f815c89ccc3205a29

  • SHA1

    ae614db915c947b4d59ffad9c70f30796746f9b9

  • SHA256

    9d84579a8ef038b25ad305a1109d0b00ae98a4fb23e7de01753697843f779983

  • SHA512

    366ca9fd72578fa78ca87bb5988854d5c0504307cc02cb0169aac089220981f27f52031547a4aa4a1877585802963141e1454ab542a3c7d68531708d8ca54cde

  • SSDEEP

    384:mtSEAIdjiPyK0aq3v3qyMyc0nhjS5Bw5mwMl9eLKLkTQC9LWQyyLnguBih5:KSnIMHjqiecWBCw5NQMekTQ2yqnguy5

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot8194110587:AAFxlMvDkF7FHuFb_7MUBNJ6f5IxW3OpGK8/sendMessag

Targets

    • Target

      DeltaLoader.exe

    • Size

      44KB

    • MD5

      50197e452db64d2f815c89ccc3205a29

    • SHA1

      ae614db915c947b4d59ffad9c70f30796746f9b9

    • SHA256

      9d84579a8ef038b25ad305a1109d0b00ae98a4fb23e7de01753697843f779983

    • SHA512

      366ca9fd72578fa78ca87bb5988854d5c0504307cc02cb0169aac089220981f27f52031547a4aa4a1877585802963141e1454ab542a3c7d68531708d8ca54cde

    • SSDEEP

      384:mtSEAIdjiPyK0aq3v3qyMyc0nhjS5Bw5mwMl9eLKLkTQC9LWQyyLnguBih5:KSnIMHjqiecWBCw5NQMekTQ2yqnguy5

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Modifies WinLogon for persistence

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks