Analysis

  • max time kernel
    121s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 21:02

General

  • Target

    70928f07076ca83678812570f1e9f05c.exe

  • Size

    11.3MB

  • MD5

    70928f07076ca83678812570f1e9f05c

  • SHA1

    9900429544963a60441ee1ef841eed87eeebf69a

  • SHA256

    4a20d88652a74ef776db2ace59a63815f3c446fb62f7d443145a97158ec19436

  • SHA512

    71cc7c856950194da15d7fab029d47ce697807973bf501a41aca7fe56df54f513cd63d47a098a7842262f7edc915b79748679468586bcbb88b0284b46d59329c

  • SSDEEP

    49152:fRBZj7amA9VSLGmJH77dPh89WU4OYDVD/ZnxMBStAkAqvlABXj6TKol4NWFg/Bbv:pW

Malware Config

Signatures

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • GoLang User-Agent 3 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70928f07076ca83678812570f1e9f05c.exe
    "C:\Users\Admin\AppData\Local\Temp\70928f07076ca83678812570f1e9f05c.exe"
    1⤵
      PID:2260

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Credential Access

    Unsecured Credentials

    2
    T1552

    Credentials In Files

    2
    T1552.001

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2260-0-0x000007FFFF790000-0x000007FFFFFAB000-memory.dmp
      Filesize

      8.1MB

    • memory/2260-1-0x0000000048780000-0x0000000048F32000-memory.dmp
      Filesize

      7.7MB

    • memory/2260-14-0x0000000048780000-0x0000000048F32000-memory.dmp
      Filesize

      7.7MB