Behavioral task
behavioral1
Sample
1800-209-0x00000000008A0000-0x000000000099B000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1800-209-0x00000000008A0000-0x000000000099B000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1800-209-0x00000000008A0000-0x000000000099B000-memory.dmp
-
Size
1004KB
-
MD5
814f287e2004e4622594c71ce20251cc
-
SHA1
70abe7bf95624fc5bc76a20f0c36556cfc677e6e
-
SHA256
882caa90ae0905dfc5ecdbce594107b7ae596e5e40069fc0fa68cd4f49c03961
-
SHA512
745a8b9a8b1ab83c7ca6b642f2cc18f6e9ce4d2ad2d53c82a16720f5f46abbd445d8759c471fc81e667bf2fdbffb1ab5b4a1140583fbcc99d016a457510606d2
-
SSDEEP
12288:fLnFyY+BkrW53DW7oEKY8AZF1+THsPXF3L2LY5ZKhbQvpM2gv1aXlA/Z0BaxL2oz:fx3++wTW7oEKY840H3bf
Malware Config
Signatures
-
Icarusstealer family
Files
-
1800-209-0x00000000008A0000-0x000000000099B000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 522KB - Virtual size: 525KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.dbg Size: 293KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE