General

  • Target

    file.exe

  • Size

    397KB

  • Sample

    230508-j5devshe94

  • MD5

    0301483cc8508f663c162b2bfe0e3bac

  • SHA1

    9b8d6de28f47799e4af7501b3a87d723b04eaa94

  • SHA256

    b4e2bf50cf2984569728c14665f752183ae9e587c0851aad3f362be00cabe3d4

  • SHA512

    bde8dfd6e0be958787ebf776e93b5060390232f0235888363a9013c1b1eaca5ba9a49b30a3b3f29fd9600866b9be993037d3c55ca93f94fcdab90c2b7082291d

  • SSDEEP

    6144:P7JJ2cBPQbp6ZHGBnqmTysu0oHIWUNoyy/1:XRBPJZHGBnqmTysu0oHIWUNoyy/1

Malware Config

Extracted

Family

icarusstealer

Attributes
  • payload_url

    https://raw.githubusercontent.com/HiddenEyeZ/tg/main/rt.jpg

Targets

    • Target

      file.exe

    • Size

      397KB

    • MD5

      0301483cc8508f663c162b2bfe0e3bac

    • SHA1

      9b8d6de28f47799e4af7501b3a87d723b04eaa94

    • SHA256

      b4e2bf50cf2984569728c14665f752183ae9e587c0851aad3f362be00cabe3d4

    • SHA512

      bde8dfd6e0be958787ebf776e93b5060390232f0235888363a9013c1b1eaca5ba9a49b30a3b3f29fd9600866b9be993037d3c55ca93f94fcdab90c2b7082291d

    • SSDEEP

      6144:P7JJ2cBPQbp6ZHGBnqmTysu0oHIWUNoyy/1:XRBPJZHGBnqmTysu0oHIWUNoyy/1

    • IcarusStealer

      Icarus is a modular stealer written in C# First adverts in July 2022.

    • Modifies WinLogon for persistence

    • Modifies Installed Components in the registry

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks