Overview
overview
10Static
static
3Icarus/ICARUS.exe
windows7-x64
10Icarus/ICARUS.exe
windows10-2004-x64
10Icarus/Ico...or.dll
windows7-x64
1Icarus/Ico...or.dll
windows10-2004-x64
1Icarus/PeNet.Asn1.dll
windows7-x64
1Icarus/PeNet.Asn1.dll
windows10-2004-x64
1Icarus/PeNet.dll
windows7-x64
1Icarus/PeNet.dll
windows10-2004-x64
1Icarus/dnlib.dll
windows7-x64
1Icarus/dnlib.dll
windows10-2004-x64
1Icarus/new...on.dll
windows7-x64
1Icarus/new...on.dll
windows10-2004-x64
1General
-
Target
Icarus.rar
-
Size
9.6MB
-
Sample
240228-e4q74sbb43
-
MD5
cf7c00d278e768d37e222b471afe6fa7
-
SHA1
7aa8db85b79ac4bbad2fed48280b5ee37a96bb57
-
SHA256
199265301b5d37b1fdf25ab4ffbd5be15ba3a305803d536885be0fbd6aca3c3e
-
SHA512
895cb139da711fb727d44ca168da8ae2f9357d277afed10f47cefe1b9d47225b84d6ea99fb476bb5e8e79d5acd142e27cbd1542a7c3f201122589904217d56d3
-
SSDEEP
196608:oPWeUedsYnK7Q7CE2Zi45lO4nftv0cuaPdvrqt8l1ra8WcnqhbWf1FD6xzPHUFT:redlK7emHtnuarlpnqhbWfD6F/U5
Static task
static1
Behavioral task
behavioral1
Sample
Icarus/ICARUS.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Icarus/ICARUS.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Icarus/IconExtractor.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Icarus/IconExtractor.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Icarus/PeNet.Asn1.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Icarus/PeNet.Asn1.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Icarus/PeNet.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Icarus/PeNet.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Icarus/dnlib.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Icarus/dnlib.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Icarus/newtonsoft.json.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Icarus/newtonsoft.json.dll
Resource
win10v2004-20240226-en
Malware Config
Extracted
icarusstealer
-
payload_url
https://blackhatsec.org/add.jpg
https://blackhatsec.org/remove.jpg
Targets
-
-
Target
Icarus/ICARUS.exe
-
Size
9.0MB
-
MD5
9cc1ab88f9d504b9b7ba86060536591f
-
SHA1
8ca6f1b2d9b495dbdee0d7439b1e8febbfd708a9
-
SHA256
5eec574e6fb9257cc3d7cceb3d1feae2b96355ccbd0c5b5357458a905e7aea75
-
SHA512
2a26448d267b4b5611658fee597076c899a5845d00581c27d7742b0a110d5bbdc2bfd4d62702cc1a1b12cbca631e8b5b34107320061282fc239e760a00525a89
-
SSDEEP
196608:yeUedsYnK7Q7CE2Zi45lO4nftv0cuaPdvrqt8l1ra8WcnqhbWf1FD6xz:gedlK7emHtnuarlpnqhbWfD6F
Score10/10-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL
-
IcarusStealer
Icarus is a modular stealer written in C# First adverts in July 2022.
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
Icarus/IconExtractor.dll
-
Size
10KB
-
MD5
7bcf61e29e5cbcd1b81d9ab72cbfed93
-
SHA1
d082613177dd1711c18426d4f83921dd932bc7b1
-
SHA256
2c359ce857982f45b09af49dbccfb2ae302839acf1956e8325e7f854b339a8c9
-
SHA512
ce84af38dc63374d304d4e3b6c098892588df5ca5e921505c410b2a24ec0137dbc3120bc713cc0e4bf7836c57b7db224dd3264ea454cbfdb1ef78c9ffb19b6d9
-
SSDEEP
192:vyB0L3vIFktNlrgyLY5ZJeU5cs7hnvR952:vyeL3/gyLYPJR5RJG
Score1/10 -
-
-
Target
Icarus/PeNet.Asn1.dll
-
Size
25KB
-
MD5
87734056aba5bde565f0d8d6769db8e7
-
SHA1
19c09604526c5d8281363f2177b4d40d641e6335
-
SHA256
116fdc6d9bdfebed7ec330fb5690eba246131eb6bf05fd7d440bd47a2f7e840a
-
SHA512
830ed318f0cc9aa58b73887c5eada9749f93992c0574a51751d50e50a186c3a3a7af347dd61bb7f83026163696f03ab5346cdd6af9e4b76d9c3ae242efea2c4a
-
SSDEEP
768:Msb2f19J2EuAGGJ0GXJp8koIS4uvA6HrgLcWX/mPZM:MY29yAGGJ0GXJp8koIYvA6LgLRmPe
Score1/10 -
-
-
Target
Icarus/PeNet.dll
-
Size
149KB
-
MD5
9769536ffe8c9a321ba0a33d588f79be
-
SHA1
95012d6b431bbce58ca15a4d978cf2d3bc470045
-
SHA256
b1edded485addd233bd1d611768bec19590e7e18a111e2308e0c780143405b9d
-
SHA512
5fb7a57cc7b59a84cc33e4b2029903e4e78c779c48958c070602447b6eb6553f5f1e0ada4cf958df977df1309c4dc1f5a4baac5bcff79803a8de132a7248672a
-
SSDEEP
3072:1M9D2vLbACkvDxtrU23F9o4F444OZZcGyqujRwrHgO76zV+AcRWRs:1M9DYLcHU23FpyCgOcn
Score1/10 -
-
-
Target
Icarus/dnlib.dll
-
Size
1.1MB
-
MD5
508ccde8bc7003696f32af7054ca3d97
-
SHA1
1f6a0303c5ae5dc95853ec92fd8b979683c3f356
-
SHA256
4758c7c39522e17bf93b3993ada4a1f7dd42bb63331bac0dcd729885e1ba062a
-
SHA512
92a59a2e1f6bf0ce512d21cf4148fe027b3a98ed6da46925169a4d0d9835a7a4b1374ba0be84e576d9a8d4e45cb9c2336e1f5bd1ea53e39f0d8553db264e746d
-
SSDEEP
24576:WHjoaczZfdE55hHl0WQ/OO4yb99MANKtv7f2dcME:tm/BQWgww
Score1/10 -
-
-
Target
Icarus/newtonsoft.json.dll
-
Size
685KB
-
MD5
081d9558bbb7adce142da153b2d5577a
-
SHA1
7d0ad03fbda1c24f883116b940717e596073ae96
-
SHA256
b624949df8b0e3a6153fdfb730a7c6f4990b6592ee0d922e1788433d276610f3
-
SHA512
2fdf035661f349206f58ea1feed8805b7f9517a21f9c113e7301c69de160f184c774350a12a710046e3ff6baa37345d319b6f47fd24fbba4e042d54014bee511
-
SSDEEP
12288:U9BzaPm657wqehcZBLX+HK+kPJUQEKx07N0TCBGiBCjC0PDgM5j9FKjc3Q5:U8m657w6ZBLmkitKqBCjC0PDgM5A5
Score1/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1