General
-
Target
SkinSwapper.exe
-
Size
7.8MB
-
Sample
240503-e14zssfa4s
-
MD5
4a0bc66968a6315dbb5927c60f634c87
-
SHA1
e14dcffa065841466fd023cd99a3354f8edc8b9a
-
SHA256
60177d46c6dc42fd8118a280e0eb2056f05915dde1c24c4f5322e929c73956b8
-
SHA512
4f07cda2f639e37861cc7681b33e3ec0dd0670c1d095c66f3df64928c5a01357572016f40d7e16e97c2b66018ef2bb711e454de9607f3b0c4d80bb436776ea80
-
SSDEEP
196608:YrBZS6ykGjALAZRvMDPFnLTuref1hh/TPTS4nz0szTR7Ai:OrygLAZ0nLTuref1hh/bTS4nz0szTRsi
Static task
static1
Behavioral task
behavioral1
Sample
SkinSwapper.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
SkinSwapper.exe
-
Size
7.8MB
-
MD5
4a0bc66968a6315dbb5927c60f634c87
-
SHA1
e14dcffa065841466fd023cd99a3354f8edc8b9a
-
SHA256
60177d46c6dc42fd8118a280e0eb2056f05915dde1c24c4f5322e929c73956b8
-
SHA512
4f07cda2f639e37861cc7681b33e3ec0dd0670c1d095c66f3df64928c5a01357572016f40d7e16e97c2b66018ef2bb711e454de9607f3b0c4d80bb436776ea80
-
SSDEEP
196608:YrBZS6ykGjALAZRvMDPFnLTuref1hh/TPTS4nz0szTR7Ai:OrygLAZ0nLTuref1hh/bTS4nz0szTRsi
Score10/10-
Shurk Stealer payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-