General
-
Target
3550c2f0145c1916fcaaf5d9ec531fea9bbea378e0c2b30fe6a14db0b2bdd7cf
-
Size
1.0MB
-
Sample
230418-alpjcaad31
-
MD5
259bab637992e7c6be97b95e0b504cf5
-
SHA1
feccd63ab2adc6cda106ad7221f7ed0ac7faee2d
-
SHA256
3550c2f0145c1916fcaaf5d9ec531fea9bbea378e0c2b30fe6a14db0b2bdd7cf
-
SHA512
d31a5e8c5c48c6dc1d0c7600783e83b6e065197cd36998e2b8b8070d5c08e640608d1d05fc48742470f0a7d20da6641fdcce7c88d5be15e6ab32d48131a9cc24
-
SSDEEP
24576:JyON+T6A+raTj43G/aBoLX/U47FtOmL+Z3Hc3FWya2F:8ON+X+ra34W7ckF8A+xHc3
Static task
static1
Behavioral task
behavioral1
Sample
3550c2f0145c1916fcaaf5d9ec531fea9bbea378e0c2b30fe6a14db0b2bdd7cf.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Extracted
icarusstealer
5.75.162.221
-
payload_url
http://193.31.116.239/crypt/public/Update_Downloads/patata.jpg
Targets
-
-
Target
3550c2f0145c1916fcaaf5d9ec531fea9bbea378e0c2b30fe6a14db0b2bdd7cf
-
Size
1.0MB
-
MD5
259bab637992e7c6be97b95e0b504cf5
-
SHA1
feccd63ab2adc6cda106ad7221f7ed0ac7faee2d
-
SHA256
3550c2f0145c1916fcaaf5d9ec531fea9bbea378e0c2b30fe6a14db0b2bdd7cf
-
SHA512
d31a5e8c5c48c6dc1d0c7600783e83b6e065197cd36998e2b8b8070d5c08e640608d1d05fc48742470f0a7d20da6641fdcce7c88d5be15e6ab32d48131a9cc24
-
SSDEEP
24576:JyON+T6A+raTj43G/aBoLX/U47FtOmL+Z3Hc3FWya2F:8ON+X+ra34W7ckF8A+xHc3
-
IcarusStealer
Icarus is a modular stealer written in C# First adverts in July 2022.
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-