General

  • Target

    30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09

  • Size

    731KB

  • Sample

    220502-xrrbfsgeck

  • MD5

    28874004a01799ba8395ce196e6cb0e0

  • SHA1

    7837f1be070ce7a7f857a2eb225818780fd4a420

  • SHA256

    30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09

  • SHA512

    7bbfb6c523433b329b765a355f62d2df20c44ffd1cb4472a5674050867c77b45bc086102e25c3e3b6112a2477a9cb1ac0a10fb0b4fa186438557919c0438856b

Malware Config

Targets

    • Target

      30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09

    • Size

      731KB

    • MD5

      28874004a01799ba8395ce196e6cb0e0

    • SHA1

      7837f1be070ce7a7f857a2eb225818780fd4a420

    • SHA256

      30015a22e816fa1337c99c54088c7f08712167e2ec14162496fb4da298f51b09

    • SHA512

      7bbfb6c523433b329b765a355f62d2df20c44ffd1cb4472a5674050867c77b45bc086102e25c3e3b6112a2477a9cb1ac0a10fb0b4fa186438557919c0438856b

    • Shurk

      Shurk is an infostealer, written in C++ which appeared in 2021.

    • Shurk Stealer Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks