General
-
Target
78bc9c35531a7e1a31af3bdff4083df6.exe
-
Size
7.7MB
-
Sample
230810-t7yhxsgh3x
-
MD5
78bc9c35531a7e1a31af3bdff4083df6
-
SHA1
a679051cff10c802a126c25c42f12fefac857a31
-
SHA256
108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d
-
SHA512
2a41f758b0da999e3d2afbe4c7f0f5b4d675dc643f866d4947b9570c9b8ccd6bc3ebf44a67c82633ae9992404c1e9a9ba0956712a451446a9e8ddd6fcc1ef526
-
SSDEEP
196608:SdrOnwUbN9pdNqVWEwLnN+HDc/Up7sSpoVmPYYfW/:SVRUb5dN65ON+AMWS6VmlW/
Static task
static1
Behavioral task
behavioral1
Sample
78bc9c35531a7e1a31af3bdff4083df6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
78bc9c35531a7e1a31af3bdff4083df6.exe
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
78bc9c35531a7e1a31af3bdff4083df6.exe
-
Size
7.7MB
-
MD5
78bc9c35531a7e1a31af3bdff4083df6
-
SHA1
a679051cff10c802a126c25c42f12fefac857a31
-
SHA256
108dd8675ad26778748b563a1f590fef6f9875d484002e3d48adb7268358263d
-
SHA512
2a41f758b0da999e3d2afbe4c7f0f5b4d675dc643f866d4947b9570c9b8ccd6bc3ebf44a67c82633ae9992404c1e9a9ba0956712a451446a9e8ddd6fcc1ef526
-
SSDEEP
196608:SdrOnwUbN9pdNqVWEwLnN+HDc/Up7sSpoVmPYYfW/:SVRUb5dN65ON+AMWS6VmlW/
Score10/10-
Shurk Stealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-