Analysis

  • max time kernel
    141s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    27-04-2022 17:24

General

  • Target

    c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7.exe

  • Size

    6.1MB

  • MD5

    70cbe62fff1cd6b8470fbe3a7e6bb720

  • SHA1

    4a71c03131cc4eb93ea4ae6f684927792fdcc243

  • SHA256

    c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7

  • SHA512

    68ae8144741aa0c9ed1fac6e9d666f1e5d62636089bccf9558f8e86ea334e58f980c81a4179765a7c663d717f709b6c9ce39186c6d6bbef69bffc0c26621be6a

Malware Config

Signatures

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer Payload 2 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7.exe
    "C:\Users\Admin\AppData\Local\Temp\c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1868-54-0x0000000001140000-0x000000000175C000-memory.dmp

    Filesize

    6.1MB

  • memory/1868-56-0x0000000001140000-0x000000000175C000-memory.dmp

    Filesize

    6.1MB