Analysis
-
max time kernel
4294212s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
28-03-2022 13:55
Behavioral task
behavioral1
Sample
82bf6a19170c4f0f7499b65826bd529bbd5c5ca4c9de6aef795ee8caf92a40d2.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
82bf6a19170c4f0f7499b65826bd529bbd5c5ca4c9de6aef795ee8caf92a40d2.exe
Resource
win10v2004-20220310-en
General
-
Target
82bf6a19170c4f0f7499b65826bd529bbd5c5ca4c9de6aef795ee8caf92a40d2.exe
-
Size
5.5MB
-
MD5
110828c3586e434a516028fd3c4aec01
-
SHA1
5589cb49122f5ac9abf135641f1781219fe2e508
-
SHA256
82bf6a19170c4f0f7499b65826bd529bbd5c5ca4c9de6aef795ee8caf92a40d2
-
SHA512
17cab8f161db27c1028ac27cdecf35b216bfbc1e6babd6175bdd740d69b48e970060d22f0b8bf3cafb2717665c727b0cff44b1e3f8040f1a3a6b61a923ef0e27
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/2024-64-0x0000000000400000-0x000000000097F000-memory.dmp shurk_stealer behavioral1/memory/2024-65-0x0000000000400000-0x000000000097F000-memory.dmp shurk_stealer -
resource yara_rule behavioral1/memory/2024-64-0x0000000000400000-0x000000000097F000-memory.dmp vmprotect behavioral1/memory/2024-65-0x0000000000400000-0x000000000097F000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2024 82bf6a19170c4f0f7499b65826bd529bbd5c5ca4c9de6aef795ee8caf92a40d2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2024 82bf6a19170c4f0f7499b65826bd529bbd5c5ca4c9de6aef795ee8caf92a40d2.exe 2024 82bf6a19170c4f0f7499b65826bd529bbd5c5ca4c9de6aef795ee8caf92a40d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82bf6a19170c4f0f7499b65826bd529bbd5c5ca4c9de6aef795ee8caf92a40d2.exe"C:\Users\Admin\AppData\Local\Temp\82bf6a19170c4f0f7499b65826bd529bbd5c5ca4c9de6aef795ee8caf92a40d2.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2024