General
-
Target
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb
-
Size
732KB
-
Sample
220307-j734aseggn
-
MD5
80a78957acf8c76491ec63b609047c13
-
SHA1
f9baa60988ce6be300184a38903b353d590b6ded
-
SHA256
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb
-
SHA512
3fe59945343eeab85817b03e00a4104458404bd9af7fd467d442ddf8b674365f5b8ddbdca0ca0b1d84a28839b028a9fc6d7efdca664db182544cd6164447cbce
Static task
static1
Behavioral task
behavioral1
Sample
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb
-
Size
732KB
-
MD5
80a78957acf8c76491ec63b609047c13
-
SHA1
f9baa60988ce6be300184a38903b353d590b6ded
-
SHA256
568d57010dccfb07b197bf77fbdc499c37d8addbc411da6e5725ea20714906cb
-
SHA512
3fe59945343eeab85817b03e00a4104458404bd9af7fd467d442ddf8b674365f5b8ddbdca0ca0b1d84a28839b028a9fc6d7efdca664db182544cd6164447cbce
Score10/10-
Shurk Stealer Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-