D:\chuerk\chuerk_gh\CHUERK\chuerk\obj\Debug\netcoreapp3.1\chuerk.pdb
Static task
static1
Behavioral task
behavioral1
Sample
netcoreapp3.1/chuerk.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
netcoreapp3.1/chuerk.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
netcoreapp3.1/chuerk.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
netcoreapp3.1/chuerk.exe
Resource
win10v2004-20240802-en
General
-
Target
chuerk.zip
-
Size
78KB
-
MD5
95f1e8eaf180db589a1555b775a1c185
-
SHA1
c599cefe96e95091af6f4c72bdc643b76dc06cd7
-
SHA256
30ad97fc2756f22fe3cf59170e39b1e39b299ac827f6a8235231c2053d609a11
-
SHA512
3c4558df8360aaf7b588430d2d2afe61b9cb44c6251a779ed1523b8871ae9240e68d91f139aef4b785443d19d92ee7218b3891fda63cfac144d19b6cd4b1f86a
-
SSDEEP
1536:9sHFKKLd3IPTpfV0+fv8pef0+8zenbWf/6OsFiR61h98nb:6HFnePTs+ff0Nx/6OsFic1cnb
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/netcoreapp3.1/chuerk.dll unpack001/netcoreapp3.1/chuerk.exe
Files
-
chuerk.zip.zip
Password: infected
-
netcoreapp3.1/chuerk.deps.json
-
netcoreapp3.1/chuerk.dll.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
netcoreapp3.1/chuerk.exe.exe windows:6 windows x64 arch:x64
Password: infected
8541289ad805913417662883d15a837d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\a\_work\1\s\artifacts\obj\win-x64.Release\corehost\cli\apphost\Release\apphost.pdb
Imports
kernel32
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFullPathNameW
GetTempPathW
GetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetEnvironmentVariableW
GetCurrentProcess
IsWow64Process
GetModuleFileNameW
GetModuleHandleExW
GetProcAddress
LoadLibraryExW
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
OutputDebugStringW
GetModuleHandleW
GetCurrentProcessId
Sleep
RemoveDirectoryW
DeleteCriticalSection
CreateDirectoryW
InitializeCriticalSectionAndSpinCount
SetLastError
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
LCMapStringEx
DecodePointer
EncodePointer
InitializeCriticalSectionEx
GetStringTypeW
user32
MessageBoxW
shell32
ShellExecuteW
advapi32
RegOpenKeyExW
RegCloseKey
ReportEventW
RegisterEventSourceW
DeregisterEventSource
RegGetValueW
api-ms-win-crt-runtime-l1-1-0
_initialize_wide_environment
_invalid_parameter_noinfo_noreturn
_set_app_type
_seh_filter_exe
_cexit
_crt_atexit
_get_initial_wide_environment
_initialize_onexit_table
_exit
__p___argc
__p___wargv
_c_exit
_register_thread_local_exe_atexit_callback
_initterm
_configure_wide_argv
terminate
_initterm_e
_register_onexit_function
_errno
abort
exit
api-ms-win-crt-stdio-l1-1-0
fclose
__p__commode
__stdio_common_vsprintf_s
fread
fseek
fwrite
_set_fmode
__acrt_iob_func
fputwc
fputws
__stdio_common_vfwprintf
_wfopen
fflush
__stdio_common_vswprintf
api-ms-win-crt-string-l1-1-0
wcsncmp
_wcsnicmp
_wcsdup
strcspn
strcpy_s
_wcsicmp
wcsnlen
memset
api-ms-win-crt-math-l1-1-0
__setusermatherr
frexp
api-ms-win-crt-heap-l1-1-0
calloc
free
_callnewh
malloc
_set_new_mode
api-ms-win-crt-locale-l1-1-0
___mb_cur_max_func
setlocale
__pctype_func
___lc_codepage_func
_unlock_locales
_lock_locales
_configthreadlocale
___lc_locale_name_func
localeconv
api-ms-win-crt-filesystem-l1-1-0
_wrename
_wremove
api-ms-win-crt-convert-l1-1-0
wcstoul
_wtoi
api-ms-win-crt-time-l1-1-0
wcsftime
_gmtime64
_time64
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
netcoreapp3.1/chuerk.pdb
-
netcoreapp3.1/chuerk.runtimeconfig.dev.json
-
netcoreapp3.1/chuerk.runtimeconfig.json