Analysis

  • max time kernel
    11s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2023 16:24

General

  • Target

    70928f07076ca83678812570f1e9f05c.exe

  • Size

    11.3MB

  • MD5

    70928f07076ca83678812570f1e9f05c

  • SHA1

    9900429544963a60441ee1ef841eed87eeebf69a

  • SHA256

    4a20d88652a74ef776db2ace59a63815f3c446fb62f7d443145a97158ec19436

  • SHA512

    71cc7c856950194da15d7fab029d47ce697807973bf501a41aca7fe56df54f513cd63d47a098a7842262f7edc915b79748679468586bcbb88b0284b46d59329c

  • SSDEEP

    49152:fRBZj7amA9VSLGmJH77dPh89WU4OYDVD/ZnxMBStAkAqvlABXj6TKol4NWFg/Bbv:pW

Malware Config

Signatures

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70928f07076ca83678812570f1e9f05c.exe
    "C:\Users\Admin\AppData\Local\Temp\70928f07076ca83678812570f1e9f05c.exe"
    1⤵
      PID:4912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4912-0-0x000002ACCC1C0000-0x000002ACCC972000-memory.dmp

      Filesize

      7.7MB

    • memory/4912-1-0x00007FF4E3F30000-0x00007FF4E474B000-memory.dmp

      Filesize

      8.1MB