General
-
Target
superiorityFixlld..Scr
-
Size
7.9MB
-
Sample
240817-ykmkcstcjb
-
MD5
be92f99f33ee6550e6f8c43b2ee1fe03
-
SHA1
f8521a26ea702df23985af4b43e59119c8895544
-
SHA256
07a97ead754a2e394483fb32eec4f6f2cb063d497089ef1fb03b942b6a371d03
-
SHA512
bf8a5600e2e0782075e7d52c6936a0045bc53bf8210136fc60f1966b76856f450e0ad755edd3f07e7274ca57c1e043ddd96ea23c128286d774a9e9b84ad1d37e
-
SSDEEP
98304:GaslCx7oFJWk5THpvT3L7mn5Uz8203h/R2dt5TinhX:G3CKnWQTH5m5UbaZcpTi
Static task
static1
Behavioral task
behavioral1
Sample
superiorityFixlld..scr
Resource
win10v2004-20240802-uk
Malware Config
Extracted
sharpstealer
https://api.telegram.org/bot7033911549:AAFm822dQHF6seFxiy7DwDnEM71DQula7cY/sendMessage?chat_id=6942274023
-
max_exfil_filesize
1.5e+06
-
proxy_port
168.235.103.57:3128
-
vime_world
false
Targets
-
-
Target
superiorityFixlld..Scr
-
Size
7.9MB
-
MD5
be92f99f33ee6550e6f8c43b2ee1fe03
-
SHA1
f8521a26ea702df23985af4b43e59119c8895544
-
SHA256
07a97ead754a2e394483fb32eec4f6f2cb063d497089ef1fb03b942b6a371d03
-
SHA512
bf8a5600e2e0782075e7d52c6936a0045bc53bf8210136fc60f1966b76856f450e0ad755edd3f07e7274ca57c1e043ddd96ea23c128286d774a9e9b84ad1d37e
-
SSDEEP
98304:GaslCx7oFJWk5THpvT3L7mn5Uz8203h/R2dt5TinhX:G3CKnWQTH5m5UbaZcpTi
-
Sharp Stealer
Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2