General
-
Target
AkebiLauncher.exe
-
Size
8.7MB
-
Sample
230727-vzge4sgd88
-
MD5
346403dc2892f3f445123f001a6709cb
-
SHA1
b59e5a76feeb079cdea6a4a39544175d9f8a4d70
-
SHA256
e45e34b67a7c2a3073721b7f274087d9099289881c5701129b339ecfa9a6bf0a
-
SHA512
0c90f77b60ae4b30a7310172b1b438613a0f328e6935f1e74f14b406f62929f3270254b7026923a8d650e5d50eb7241d1901d524833379f67acc48129b1236df
-
SSDEEP
196608:zBRNqLt94ZYvkM/IuuVkEwu01+pYxfdkKZhYLN/ajKLt/G38Ck:zBcKZYvjwqECAIrZK5/ajx
Static task
static1
Behavioral task
behavioral1
Sample
AkebiLauncher.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
AkebiLauncher.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
AkebiLauncher.exe
-
Size
8.7MB
-
MD5
346403dc2892f3f445123f001a6709cb
-
SHA1
b59e5a76feeb079cdea6a4a39544175d9f8a4d70
-
SHA256
e45e34b67a7c2a3073721b7f274087d9099289881c5701129b339ecfa9a6bf0a
-
SHA512
0c90f77b60ae4b30a7310172b1b438613a0f328e6935f1e74f14b406f62929f3270254b7026923a8d650e5d50eb7241d1901d524833379f67acc48129b1236df
-
SSDEEP
196608:zBRNqLt94ZYvkM/IuuVkEwu01+pYxfdkKZhYLN/ajKLt/G38Ck:zBcKZYvjwqECAIrZK5/ajx
Score10/10-
Shurk Stealer payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-