General

  • Target

    vcruntime.exe

  • Size

    494KB

  • Sample

    240226-zlqtvagc5y

  • MD5

    367b357eb756b2683fa40c0cf0daaa5a

  • SHA1

    625784b8795b5db0438d81e7fd66fd07fb44a313

  • SHA256

    0d84d62088f6038da65f46a35682b94345628ff23a3db77b9bc82837a6be0e13

  • SHA512

    034d264627c22c6df15171516f7dd2e4283afa247beec9ad80d2839cf3fbd5ce598bac92c1be299bd85279f1fd8808cd4a96f7bc99669339270054b283f8e72a

  • SSDEEP

    12288:LokTLuLut6N6LqQzJqkKAulc84bYBbuB1t4cWWzDKuVAccIpGNJ+QN:sWZ6N6LqQzJqkS

Malware Config

Extracted

Family

icarusstealer

Attributes
  • payload_url

    https://blackhatsec.org/add.jpg

    https://blackhatsec.org/remove.jpg

Targets

    • Target

      vcruntime.exe

    • Size

      494KB

    • MD5

      367b357eb756b2683fa40c0cf0daaa5a

    • SHA1

      625784b8795b5db0438d81e7fd66fd07fb44a313

    • SHA256

      0d84d62088f6038da65f46a35682b94345628ff23a3db77b9bc82837a6be0e13

    • SHA512

      034d264627c22c6df15171516f7dd2e4283afa247beec9ad80d2839cf3fbd5ce598bac92c1be299bd85279f1fd8808cd4a96f7bc99669339270054b283f8e72a

    • SSDEEP

      12288:LokTLuLut6N6LqQzJqkKAulc84bYBbuB1t4cWWzDKuVAccIpGNJ+QN:sWZ6N6LqQzJqkS

    • IcarusStealer

      Icarus is a modular stealer written in C# First adverts in July 2022.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

Query Registry

6
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

2
T1120

Command and Control

Web Service

1
T1102

Tasks