General

  • Target

    369b837d2a43020353233d28b132827efd0fc311b3b56f25aa1b9ba5b209a539

  • Size

    1.9MB

  • Sample

    220217-ehl19saaaj

  • MD5

    31d419dcf1a407ca78a912fec4369155

  • SHA1

    148931fc3308f19f113500932f0f50ea23bbf83d

  • SHA256

    369b837d2a43020353233d28b132827efd0fc311b3b56f25aa1b9ba5b209a539

  • SHA512

    aa844c1b84c83e29f6dbe281a08a8bd0af1587a7c4db26ba36bae1f00947da99afaeb7ccb967e5fa3f7f0d0a24bd8bbc9636385ac5f32de238dfd3a519b8bf98

Malware Config

Targets

    • Target

      369b837d2a43020353233d28b132827efd0fc311b3b56f25aa1b9ba5b209a539

    • Size

      1.9MB

    • MD5

      31d419dcf1a407ca78a912fec4369155

    • SHA1

      148931fc3308f19f113500932f0f50ea23bbf83d

    • SHA256

      369b837d2a43020353233d28b132827efd0fc311b3b56f25aa1b9ba5b209a539

    • SHA512

      aa844c1b84c83e29f6dbe281a08a8bd0af1587a7c4db26ba36bae1f00947da99afaeb7ccb967e5fa3f7f0d0a24bd8bbc9636385ac5f32de238dfd3a519b8bf98

    • Shurk

      Shurk is an infostealer, written in C++ which appeared in 2021.

    • Shurk Stealer Payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Executes dropped EXE

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks