General
-
Target
4ec76c6c6b2b93873c53cbf094d1b4ad911e9615947039d8735e3e72e9b34ca2.zip
-
Size
988KB
-
Sample
230516-1rr5jabh4w
-
MD5
a43b5ec1d1e8224d553719a46d0b5fd3
-
SHA1
b5b5a3e938e8d74e70eb2e6ad8f50221802c4617
-
SHA256
64cc40455d87ff8e9cbf3c113dbfbca8fcdf1a1191e803726162bd972deeba3a
-
SHA512
d9f3967601ca8719bb099aa48162edda70de96f85e2daa3cc95f8e7b72a2f5cae0f643586fab7887acc29041c5c158524bfa24694b13059465ea2c0ad8ad7936
-
SSDEEP
12288:aAi/nxhPTVaLPbMoZoYvQ7NUxJjfTdvMv+kyNYix3QgL5uaTAZuu7iKabpkHY952:aAAn3YPZxBLMWrLLYCA6BN4YHus+C0
Static task
static1
Behavioral task
behavioral1
Sample
4ec76c6c6b2b93873c53cbf094d1b4ad911e9615947039d8735e3e72e9b34ca2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4ec76c6c6b2b93873c53cbf094d1b4ad911e9615947039d8735e3e72e9b34ca2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
icarusstealer
-
payload_url
https://raw.githubusercontent.com/HiddenEyeZ/tg/main/rt.jpg
Targets
-
-
Target
4ec76c6c6b2b93873c53cbf094d1b4ad911e9615947039d8735e3e72e9b34ca2.exe
-
Size
1.1MB
-
MD5
01e031d7c05c245ecff24a536b5005d2
-
SHA1
329e480e96472c35044d13713475ebeb7da91891
-
SHA256
4ec76c6c6b2b93873c53cbf094d1b4ad911e9615947039d8735e3e72e9b34ca2
-
SHA512
78560b5a7f8a6c6b544c60a556990c259d27d34af78fc4617b382294d50e044125eb1b780c8360a96593e269a5d1dd40023b7e1f1c3ee37e4bc610125ade8da2
-
SSDEEP
24576:STbBv5rUg09NfbZYkgcGBslupFKUEBCjDWhGapW:0BRe1bZYKGOl+FKUoCjDW6
Score10/10-
IcarusStealer
Icarus is a modular stealer written in C# First adverts in July 2022.
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-