Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-04-2022 17:24
Behavioral task
behavioral1
Sample
c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7.exe
Resource
win10v2004-20220414-en
General
-
Target
c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7.exe
-
Size
6.1MB
-
MD5
70cbe62fff1cd6b8470fbe3a7e6bb720
-
SHA1
4a71c03131cc4eb93ea4ae6f684927792fdcc243
-
SHA256
c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7
-
SHA512
68ae8144741aa0c9ed1fac6e9d666f1e5d62636089bccf9558f8e86ea334e58f980c81a4179765a7c663d717f709b6c9ce39186c6d6bbef69bffc0c26621be6a
Malware Config
Signatures
-
Shurk
Shurk is an infostealer, written in C++ which appeared in 2021.
-
Shurk Stealer Payload 2 IoCs
resource yara_rule behavioral1/memory/1868-54-0x0000000001140000-0x000000000175C000-memory.dmp shurk_stealer behavioral1/memory/1868-56-0x0000000001140000-0x000000000175C000-memory.dmp shurk_stealer -
resource yara_rule behavioral1/memory/1868-54-0x0000000001140000-0x000000000175C000-memory.dmp vmprotect behavioral1/memory/1868-56-0x0000000001140000-0x000000000175C000-memory.dmp vmprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1868 c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7.exe 1868 c19b179d1b3234215443a24eeda86e0f09b0d8846eb719e2382a5217387aa6b7.exe