Analysis
-
max time kernel
150s -
max time network
167s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
06-08-2021 11:00
Static task
static1
Behavioral task
behavioral1
Sample
702dc8fde667d79575a192cee0075d75b6c2266138896e529cdc08fdaaea440c.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
702dc8fde667d79575a192cee0075d75b6c2266138896e529cdc08fdaaea440c.exe
Resource
win10v20210410
General
-
Target
702dc8fde667d79575a192cee0075d75b6c2266138896e529cdc08fdaaea440c.exe
-
Size
472KB
-
MD5
a99146b239d8f7be6e7281460eb625ef
-
SHA1
7ac0e23d8c1e6ade2d7eedf2bdcbf431967aa726
-
SHA256
702dc8fde667d79575a192cee0075d75b6c2266138896e529cdc08fdaaea440c
-
SHA512
255a6ee52c7e31bc9ce90d1d483763683461f7af55fa44d4049c420dc1ab95e753fe712abfe649fb199385ee82c7c2135ced5a0a8873a84ff8935403678584bd
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1892 702dc8fde667d79575a192cee0075d75b6c2266138896e529cdc08fdaaea440c.exe