General
-
Target
generated21.exe
-
Size
2.8MB
-
Sample
250406-yf8xsszl14
-
MD5
2ee4087423cdcc9ef14519db15f627b6
-
SHA1
104667f7a390ce8d36a384365d6cca93dbff402f
-
SHA256
28828524d62ba090c2a5a558afee71c10d4b4db87c6d73e074698ef4395b8bdc
-
SHA512
9f68b9e4136cb60eb42729b58097b9185a833b77bb5a253d5492ba259f50cd1ec4ebda1f37184aada58c9f39eb6e02b48964e41e6deb5dc57a2305bcdd6f76eb
-
SSDEEP
49152:ws0IXxtkqXfd+/9A9Acc125Zsl5hanCLm/+axysYC6syUkoPaPS2AJNySUP7k:wF6xtkqXf0FZjGsJWCLmctClVkoOSfJ0
Static task
static1
Behavioral task
behavioral1
Sample
generated21.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/sendMessage?chat_id=6565043849
https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/sendDocument?chat_id=6565043849&caption=%F0%9F%A5%A0Cookies%20from%20these%20websites%20%5Bgmail.com%20github.com%20%5D%20were%20successfully%20grabbed%20from%20the%20Default%20profile%20of%20Chrom
https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/sendDocument?chat_id=6565043849&caption=%F0%9F%A5%A0Cookies%20from%20these%20websites%20%5Bgmail.com%20github.com%20%5D%20were%20successfully%20grabbed%20from%20the%20Default%20profile%20of%20Microsoft%20Edg
https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/getUpdates?offset=-
Targets
-
-
Target
generated21.exe
-
Size
2.8MB
-
MD5
2ee4087423cdcc9ef14519db15f627b6
-
SHA1
104667f7a390ce8d36a384365d6cca93dbff402f
-
SHA256
28828524d62ba090c2a5a558afee71c10d4b4db87c6d73e074698ef4395b8bdc
-
SHA512
9f68b9e4136cb60eb42729b58097b9185a833b77bb5a253d5492ba259f50cd1ec4ebda1f37184aada58c9f39eb6e02b48964e41e6deb5dc57a2305bcdd6f76eb
-
SSDEEP
49152:ws0IXxtkqXfd+/9A9Acc125Zsl5hanCLm/+axysYC6syUkoPaPS2AJNySUP7k:wF6xtkqXf0FZjGsJWCLmctClVkoOSfJ0
-
Gurcu family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1