General

  • Target

    f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe

  • Size

    4.1MB

  • Sample

    240813-mcrzbssfrl

  • MD5

    f6bdb0cefd4ca2a9434b06209e8cc1b0

  • SHA1

    388143051950d52623a344c55374a0475d989399

  • SHA256

    48f335a436377ecd29c32a3f7790f4ad433bab2cd9105dd14a306b518e2ca312

  • SHA512

    760e8f37ee2c79c13f8d2998fbcd35995ecb16503eb4fc6a0ffda9ee3f2dfff0dab2e26cde55394af10781cc099eadce77c46d71a84bc755e97943946071dcc1

  • SSDEEP

    98304:ECc2wTe2PmtPM0jaeORJL1yKWe2i6fv34XkoG44nIMi1vycjUuyO26:EC700qXL1ueKfQXelI2yUKN

Malware Config

Extracted

Family

sharpstealer

C2

https://api.telegram.org/bot7190885870:AAHYSkoef0HEA3D0nTDOMHDqdBh3WW8pb1U/sendMessage?chat_id=6345674054

Attributes
  • max_exfil_filesize

    1.5e+06

  • proxy_port

    168.235.103.57:3128

  • vime_world

    false

aes.plain

Targets

    • Target

      f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe

    • Size

      4.1MB

    • MD5

      f6bdb0cefd4ca2a9434b06209e8cc1b0

    • SHA1

      388143051950d52623a344c55374a0475d989399

    • SHA256

      48f335a436377ecd29c32a3f7790f4ad433bab2cd9105dd14a306b518e2ca312

    • SHA512

      760e8f37ee2c79c13f8d2998fbcd35995ecb16503eb4fc6a0ffda9ee3f2dfff0dab2e26cde55394af10781cc099eadce77c46d71a84bc755e97943946071dcc1

    • SSDEEP

      98304:ECc2wTe2PmtPM0jaeORJL1yKWe2i6fv34XkoG44nIMi1vycjUuyO26:EC700qXL1ueKfQXelI2yUKN

    • Sharp Stealer

      Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks