General
-
Target
f8.exe
-
Size
16.9MB
-
Sample
230715-tdxdrsbd69
-
MD5
a2003bd97dc1213350922c80f30c1993
-
SHA1
4d69ba16bf5b456fd0f30bda7d4ca2f4acfc29d3
-
SHA256
a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44
-
SHA512
73c6da611f124e6b31492ff9d25f6691d79d74596aeb7e877a6993d171b5b2715f536f3f965bbccc770472f02459e16f759f6ddb219a81410d1b86413aa871f1
-
SSDEEP
393216:0TQvE3PLny7Xq+4E0ZLlW3rBAtTkuk8LyKa1y3:0uQby7X/dALUVAz4n1
Static task
static1
Behavioral task
behavioral1
Sample
f8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f8.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
f8.exe
-
Size
16.9MB
-
MD5
a2003bd97dc1213350922c80f30c1993
-
SHA1
4d69ba16bf5b456fd0f30bda7d4ca2f4acfc29d3
-
SHA256
a2061e2151eab44f61c984475680cee2ae69325b4fa55aec57381f2390f97b44
-
SHA512
73c6da611f124e6b31492ff9d25f6691d79d74596aeb7e877a6993d171b5b2715f536f3f965bbccc770472f02459e16f759f6ddb219a81410d1b86413aa871f1
-
SSDEEP
393216:0TQvE3PLny7Xq+4E0ZLlW3rBAtTkuk8LyKa1y3:0uQby7X/dALUVAz4n1
Score10/10-
Shurk Stealer payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-