General
-
Target
vcruntime.exe
-
Size
494KB
-
Sample
240226-zlqtvagc5y
-
MD5
367b357eb756b2683fa40c0cf0daaa5a
-
SHA1
625784b8795b5db0438d81e7fd66fd07fb44a313
-
SHA256
0d84d62088f6038da65f46a35682b94345628ff23a3db77b9bc82837a6be0e13
-
SHA512
034d264627c22c6df15171516f7dd2e4283afa247beec9ad80d2839cf3fbd5ce598bac92c1be299bd85279f1fd8808cd4a96f7bc99669339270054b283f8e72a
-
SSDEEP
12288:LokTLuLut6N6LqQzJqkKAulc84bYBbuB1t4cWWzDKuVAccIpGNJ+QN:sWZ6N6LqQzJqkS
Static task
static1
Behavioral task
behavioral1
Sample
vcruntime.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
vcruntime.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
icarusstealer
-
payload_url
https://blackhatsec.org/add.jpg
https://blackhatsec.org/remove.jpg
Targets
-
-
Target
vcruntime.exe
-
Size
494KB
-
MD5
367b357eb756b2683fa40c0cf0daaa5a
-
SHA1
625784b8795b5db0438d81e7fd66fd07fb44a313
-
SHA256
0d84d62088f6038da65f46a35682b94345628ff23a3db77b9bc82837a6be0e13
-
SHA512
034d264627c22c6df15171516f7dd2e4283afa247beec9ad80d2839cf3fbd5ce598bac92c1be299bd85279f1fd8808cd4a96f7bc99669339270054b283f8e72a
-
SSDEEP
12288:LokTLuLut6N6LqQzJqkKAulc84bYBbuB1t4cWWzDKuVAccIpGNJ+QN:sWZ6N6LqQzJqkS
Score10/10-
IcarusStealer
Icarus is a modular stealer written in C# First adverts in July 2022.
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1