File name:

SharkHack.exe.zip

Full analysis: https://app.any.run/tasks/35f55364-17e5-43d9-a254-c6252cb42179
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 27, 2025, 15:52:38
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
upx
stealer
golang
salatstealer
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

BE37436716C2A61555B46A715503CE03

SHA1:

367893A3D6A2B7B8948589B8D50C45747541A479

SHA256:

A7C302598D6D16C9052D846763769BFB15AA8EE0660FBE3F9E35F970DCCDC1E1

SSDEEP:

98304:VeA9Jv+GJ+Haviw3qqo8DrbqsNvZdDMS9gmi4SCAghMaijhLAfzCFsCDDJfAaiiZ:ZxrQURHfSJo46+Yt2OyosrX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SALATSTEALER has been detected (YARA)

      • webrator.exe (PID: 6392)
      • webrator.exe (PID: 7376)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • SharkHack.exe (PID: 7964)
      • SharkHack.exe (PID: 7356)
    • Executable content was dropped or overwritten

      • SharkHack.exe (PID: 7964)
    • Reads security settings of Internet Explorer

      • SharkHack.exe (PID: 7964)
      • webrator.exe (PID: 8068)
      • SharkHack.exe (PID: 7356)
      • webrator.exe (PID: 7428)
    • Application launched itself

      • webrator.exe (PID: 8068)
      • webrator.exe (PID: 7428)
    • Multiple wallet extension IDs have been found

      • webrator.exe (PID: 6392)
      • webrator.exe (PID: 7376)
    • There is functionality for taking screenshot (YARA)

      • webrator.exe (PID: 6392)
      • webrator.exe (PID: 7376)
  • INFO

    • Manual execution by a user

      • SharkHack.exe (PID: 7964)
      • Taskmgr.exe (PID: 4452)
      • Taskmgr.exe (PID: 7084)
      • SharkHack.exe (PID: 7356)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5576)
    • Reads the machine GUID from the registry

      • SharkHack.exe (PID: 7964)
      • webrator.exe (PID: 6392)
      • webrator.exe (PID: 8068)
      • SharkHack.exe (PID: 7356)
      • webrator.exe (PID: 7428)
      • webrator.exe (PID: 7376)
    • Checks supported languages

      • SharkHack.exe (PID: 7964)
      • webrator.exe (PID: 8068)
      • webrator.exe (PID: 6392)
      • SharkHack.exe (PID: 8172)
      • webrator.exe (PID: 7428)
      • SharkHack.exe (PID: 7316)
      • webrator.exe (PID: 7376)
      • SharkHack.exe (PID: 7356)
    • Reads the computer name

      • SharkHack.exe (PID: 7964)
      • webrator.exe (PID: 8068)
      • webrator.exe (PID: 6392)
      • SharkHack.exe (PID: 8172)
      • webrator.exe (PID: 7428)
      • SharkHack.exe (PID: 7316)
      • webrator.exe (PID: 7376)
      • SharkHack.exe (PID: 7356)
    • Create files in a temporary directory

      • SharkHack.exe (PID: 7964)
      • SharkHack.exe (PID: 7356)
    • Process checks computer location settings

      • SharkHack.exe (PID: 7964)
      • webrator.exe (PID: 8068)
      • SharkHack.exe (PID: 7356)
      • webrator.exe (PID: 7428)
    • Application based on Golang

      • webrator.exe (PID: 6392)
      • webrator.exe (PID: 7376)
    • UPX packer has been detected

      • webrator.exe (PID: 6392)
      • webrator.exe (PID: 7376)
    • Detects GO elliptic curve encryption (YARA)

      • webrator.exe (PID: 6392)
      • webrator.exe (PID: 7376)
    • Reads the software policy settings

      • webrator.exe (PID: 6392)
      • slui.exe (PID: 7832)
      • webrator.exe (PID: 7376)
    • Checks proxy server information

      • slui.exe (PID: 7832)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 7084)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0009
ZipCompression: Unknown (99)
ZipModifyDate: 2025:05:27 15:52:04
ZipCRC: 0xc0a8e3aa
ZipCompressedSize: 13768509
ZipUncompressedSize: 13903360
ZipFileName: SharkHack.exe.bin
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
15
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe slui.exe sharkhack.exe webrator.exe no specs sharkhack.exe no specs sharkhack.exe #SALATSTEALER webrator.exe taskmgr.exe no specs taskmgr.exe sharkhack.exe no specs webrator.exe no specs sharkhack.exe no specs sharkhack.exe #SALATSTEALER webrator.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2392"C:\Users\admin\AppData\Local\Temp\SharkHack.exe" C:\Users\admin\AppData\Local\Temp\SharkHack.exeSharkHack.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\sharkhack.exe
c:\windows\system32\ntdll.dll
4452"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
5576"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\SharkHack.exe.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6392"C:\Users\admin\AppData\Local\Temp\webrator.exe" C:\Users\admin\AppData\Local\Temp\webrator.exe
webrator.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\webrator.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\bcryptprimitives.dll
7084"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
7316"C:\Users\admin\AppData\Local\Temp\SharkHack.exe" C:\Users\admin\AppData\Local\Temp\SharkHack.exe
SharkHack.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\sharkhack.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7356"C:\Users\admin\Desktop\SharkHack.exe" C:\Users\admin\Desktop\SharkHack.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\sharkhack.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7376"C:\Users\admin\AppData\Local\Temp\webrator.exe" C:\Users\admin\AppData\Local\Temp\webrator.exe
webrator.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\webrator.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\bcryptprimitives.dll
c:\windows\syswow64\winmm.dll
7428"C:\Users\admin\AppData\Local\Temp\webrator.exe" C:\Users\admin\AppData\Local\Temp\webrator.exeSharkHack.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\webrator.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\bcryptprimitives.dll
c:\windows\syswow64\winmm.dll
Total events
16 930
Read events
16 908
Write events
21
Delete events
1

Modification events

(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\SharkHack.exe.zip
(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(5576) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFA70000003B000000670400001C020000
Executable files
3
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5576WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb5576.4017\SharkHack.exe.binexecutable
MD5:622BF89FF763F6C56A149B9953517DD0
SHA256:C0982331605D28740DBA65A392D9FE4C3B17FF9D1253988C627D1739D30B4555
7964SharkHack.exeC:\Users\admin\AppData\Local\Temp\webrator.exeexecutable
MD5:7F89B880A9D009968CEB33E57F8A56BB
SHA256:EEEAAE4092D07EAECAF5A87476D1848000509EEE63565EFA3DDAE79A67472CDC
7084Taskmgr.exeC:\Users\admin\AppData\Local\D3DSCache\3534848bb9f4cb71\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.locktext
MD5:F49655F856ACB8884CC0ACE29216F511
SHA256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
7964SharkHack.exeC:\Users\admin\AppData\Local\Temp\SharkHack.exeexecutable
MD5:AADD874DCF8CF0042FC25D0C45DD9C5F
SHA256:C7EF7E4580A5740D01C3AE5634D59B39A377C81812EFDF074AE412E2981E22C5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
85
DNS requests
22
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4
System
192.168.100.255:137
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7672
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7672
SIHClient.exe
20.242.39.171:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.174
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.128
  • 40.126.31.128
  • 40.126.31.0
  • 20.190.159.75
  • 20.190.159.68
  • 20.190.159.4
  • 20.190.159.130
  • 40.126.31.1
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
  • 2a01:111:f100:a000::4134:4847
whitelisted
171.39.242.20.in-addr.arpa
unknown
7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa
unknown
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted

Threats

No threats detected
No debug info