General
-
Target
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31
-
Size
25.9MB
-
Sample
221130-xpvwvsfe33
-
MD5
767db863164ec054813a61fc1c469b60
-
SHA1
cf1f5541ea6fcd245d725b89e4e2309b895ab4f7
-
SHA256
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31
-
SHA512
c723996862f4368555af5cd3435ffc7207e9b7f945369ff543b1de5e527a26bed0cd18389ca64bb95085426b9d7f7d2753b8995de2bcfd02b882ac3f4a4f16ed
-
SSDEEP
786432:zfzDs7aZXBWhs6cets5XOjehnRLy3f3xfDcgH:zffYavetwmehntyJff
Static task
static1
Behavioral task
behavioral1
Sample
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31
-
Size
25.9MB
-
MD5
767db863164ec054813a61fc1c469b60
-
SHA1
cf1f5541ea6fcd245d725b89e4e2309b895ab4f7
-
SHA256
b13330d8e458c80c87cc8420ee96d9b1bc0e62db607c569fbe5ef7f1abd9bc31
-
SHA512
c723996862f4368555af5cd3435ffc7207e9b7f945369ff543b1de5e527a26bed0cd18389ca64bb95085426b9d7f7d2753b8995de2bcfd02b882ac3f4a4f16ed
-
SSDEEP
786432:zfzDs7aZXBWhs6cets5XOjehnRLy3f3xfDcgH:zffYavetwmehntyJff
Score10/10-
Shurk Stealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-