Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2024 07:41

General

  • Target

    a89b5a1a3c1a93488c80c0068fa16109.exe

  • Size

    472KB

  • MD5

    a89b5a1a3c1a93488c80c0068fa16109

  • SHA1

    adeb69a80fe2bf50fd4ce269cc061a92b7ea7314

  • SHA256

    6cdefe842611b0f9fea4571bc07ff0de77740f440115852436f4afd1324e981a

  • SHA512

    c9ad3935a82af2c10c7db9e2a5b83e498de7fa8864b81db33798b629aeff72ce8a5b0dcd66ddf595c608bd87e0b9a94f70fef53f58d506095dbdcb4a8416061e

  • SSDEEP

    12288:769T4U4+vKZhrTko73ri3CXEiFqrVVSPZpJDalpS6Xq2EVHfdm:7WTkqKfrTko77i3CXEigVVSPUlpSy0

Malware Config

Signatures

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a89b5a1a3c1a93488c80c0068fa16109.exe
    "C:\Users\Admin\AppData\Local\Temp\a89b5a1a3c1a93488c80c0068fa16109.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3864

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads