Trojan

Trojan-PSW.Win32.Shurk malicious file

Malware Removal

The Trojan-PSW.Win32.Shurk is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan-PSW.Win32.Shurk virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Dynamic (imported) function loading detected
  • Enumerates running processes
  • Authenticode signature is invalid
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Steals private information from local Internet browsers
  • CAPE detected the Alfonoso malware family
  • Attempts to access Bitcoin/ALTCoin wallets
  • Harvests cookies for information gathering
  • Harvests credentials from local FTP client softwares
  • Collects information to fingerprint the system

How to determine Trojan-PSW.Win32.Shurk?


File Info:

name: 851A9BD17E3BD72FC846.mlw
path: /opt/CAPEv2/storage/binaries/20ddc8a085f66cad5f6766e132bf62541c6fdc8d8e49ce1fde118435eaec84f9
crc32: 1AE7D8C8
md5: 851a9bd17e3bd72fc8462fa0bb2c1723
sha1: 424d9562deefbad243b7b217e24f9dd8764ffaa7
sha256: 20ddc8a085f66cad5f6766e132bf62541c6fdc8d8e49ce1fde118435eaec84f9
sha512: f77d8d7c70547d612a85436da5cde3b7828a293c52dd7066e7dfb147d59caeea17f3492571e71423fb11b566f169d984373d1c8cc97c802a7698e3a3db0c6fa7
ssdeep: 12288:QokfGiD8pdNn9KCT7tDlWCXJq7C7HTyyU9lbALDa/+7ZpiD:QoCDMNn9KCf1lWCXJWC73U9lq5k
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16EC4BE0BE6429076E4632430229D8F6698BD763049236577B7C42E2D5EB01F2EB36F77
sha3_384: 9c2681450c80ad4306567b6a1ed4b6f736d59abe3e4eb6b0dc1f82186c50d39a25ad890500d62083bacad59a27f4e28f
ep_bytes: e884040000e974feffff558bec81ec24
timestamp: 2022-04-17 21:02:57

Version Info:

0: [No Data]

Trojan-PSW.Win32.Shurk also known as:

BkavW32.AIDetect.malware2
MicroWorld-eScanGen:Variant.Doina.36529
FireEyeGeneric.mg.851a9bd17e3bd72f
McAfeeGenericRXSQ-WK!851A9BD17E3B
SangforTrojan.Win32.Save.a
CyrenW32/Agent.DJJ.gen!Eldorado
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/PSW.Agent.OKX
APEXMalicious
ClamAVWin.Malware.Zusy-9812688-0
KasperskyHEUR:Trojan-PSW.Win32.Shurk.gen
BitDefenderGen:Variant.Doina.36529
NANO-AntivirusTrojan.Win32.Shurk.joxrlc
AvastWin32:DullStorm-B [Pws]
TencentMalware.Win32.Gencirc.10d03d4d
Ad-AwareGen:Variant.Doina.36529
EmsisoftGen:Variant.Doina.36529 (B)
DrWebTrojan.PWS.Stealer.32969
ZillyaTrojan.Agent.Win32.2766330
McAfee-GW-EditionBehavesLike.Win32.Generic.hh
Trapminesuspicious.low.ml.score
SophosGeneric ML PUA (PUA)
IkarusTrojan-PSW.Agent
GDataWin32.Trojan-Stealer.Phoenix.B
JiangminTrojan.PSW.Shurk.q
AviraHEUR/AGEN.1213248
MicrosoftPWS:MSIL/Phoenix.GG!MTB
CynetMalicious (score: 100)
AhnLab-V3Malware/Win.Phoenix.C5094321
Acronissuspicious
VBA32BScope.Trojan.Wacatac
ALYacGen:Variant.Doina.36529
MAXmalware (ai score=83)
MalwarebytesGeneric.Trojan.Malicious.DDS
RisingTrojan.Generic@AI.100 (RDML:oIh8PQ9m8pqBMh5P+S2Iwg)
YandexTrojan.PWS.Agent!uLEZElhspcU
SentinelOneStatic AI – Suspicious PE
MaxSecureTrojan.Malware.147198105.susgen
FortinetW32/Agent.OKX!tr
BitDefenderThetaGen:NN.ZexaF.34742.IuW@a0WQw3hi
AVGWin32:DullStorm-B [Pws]
PandaTrj/GdSda.A

How to remove Trojan-PSW.Win32.Shurk?

Trojan-PSW.Win32.Shurk removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment