Behavioral task
behavioral1
Sample
8711fffca6194b39a981b40f0db1225992ab3f96823a2cbe61c6547490b5abcb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8711fffca6194b39a981b40f0db1225992ab3f96823a2cbe61c6547490b5abcb.exe
Resource
win10v2004-20230220-en
General
-
Target
6a78bd0e44ac25cf4472a4b5da44b3b0.bin
-
Size
130KB
-
MD5
bfb1a2b436febf75ee8315f1bee8fbdb
-
SHA1
2650444f7b9f498d94987b9687191dc2c0b512c4
-
SHA256
1a2ed4ee5fc3315518552cedfa54ff87eaf0028f3f0b5717d6d1b52eca4047c5
-
SHA512
9c02dfa7e0d229525c6bab4f2f59bf5098fe5c42d7e62450f39dfa9980e9c51239e9da7f372c52f574710cfc38b178f42dbea6d6ec243b738068e39da083bcf7
-
SSDEEP
3072:w2pplTtKN8CCwc8MxLLhgjXPeU1BiVwpNCGCpfH:w2pR8ldcJxaDP/1BiVwEH
Malware Config
Extracted
icarusstealer
-
payload_url
http://193.31.116.239/crypt/public/Update_Downloads/patata.jpg
Signatures
-
Icarusstealer family
Files
-
6a78bd0e44ac25cf4472a4b5da44b3b0.bin.zip
Password: infected
-
8711fffca6194b39a981b40f0db1225992ab3f96823a2cbe61c6547490b5abcb.exe.exe .js windows x86
Password: infected