Behavioral task
behavioral1
Sample
1204-283-0x0000000000390000-0x0000000000994000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1204-283-0x0000000000390000-0x0000000000994000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1204-283-0x0000000000390000-0x0000000000994000-memory.dmp
-
Size
6.0MB
-
MD5
5d33946e7a0dac3089da851824b2d45d
-
SHA1
d4cebbec71bd6a7d3bb5c36be1457f21a9df7095
-
SHA256
04a3b3ea875e339e9083fe359996d513184b1fcd19a3293a8f6dd3941178046c
-
SHA512
c2f929f7f7876a3186ae2c6693e39b5261401791f94a2bce56d1292654a9ee5907deb9053c374e7d82dcf52efbd3ca2ae974e05ce30cad2781ff6d92a5a8a1c5
-
SSDEEP
6144:2YJJ2cBPQbp6ZHGBnqmTysu0oHIWUNoyy/1:dRBPJZHGBnqmTysu0oHIWUNoyy/1
Malware Config
Extracted
icarusstealer
-
payload_url
https://raw.githubusercontent.com/HiddenEyeZ/tg/main/rt.jpg
Signatures
-
Icarusstealer family
Files
-
1204-283-0x0000000000390000-0x0000000000994000-memory.dmp.exe .js windows x86