General
-
Target
del.bat
-
Size
25B
-
Sample
230712-2bgvaseg77
-
MD5
90982e304ae9cac175b8953d8dac1034
-
SHA1
eabc2a4088796719de06f31fa7a086677dfa7c75
-
SHA256
186c18ad276aa93b47ac826eef1925b9d15b0dc9cd6daf4c4ed89ba6df09b232
-
SHA512
add6afd6dce66ffeb29519ea2daf326cb78dd9e19414d2428eba1cbd39a849dfe9a5d1918117b9469625b5233d45932b22b234ba5dc4eb4ed5cacae09d9bf3af
Static task
static1
Behavioral task
behavioral1
Sample
del.bat
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
del.bat
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
del.bat
-
Size
25B
-
MD5
90982e304ae9cac175b8953d8dac1034
-
SHA1
eabc2a4088796719de06f31fa7a086677dfa7c75
-
SHA256
186c18ad276aa93b47ac826eef1925b9d15b0dc9cd6daf4c4ed89ba6df09b232
-
SHA512
add6afd6dce66ffeb29519ea2daf326cb78dd9e19414d2428eba1cbd39a849dfe9a5d1918117b9469625b5233d45932b22b234ba5dc4eb4ed5cacae09d9bf3af
Score10/10-
Shurk Stealer payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-