General

  • Target

    05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N

  • Size

    4.1MB

  • Sample

    240920-bqjz4a1erh

  • MD5

    67e8b6db3a3d5583a5cbe684159f8270

  • SHA1

    21fff27a12c542129cde65b30d62e0a3bf7f938a

  • SHA256

    05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5

  • SHA512

    979f3e3124f1bd11c2a9f2737bb234475147b4d3ddc016eebe9bbe555faa22ffa1b22f977627cdbf7d49a4d6e76662b0cdaf21e63ec89c2a8409182b3b55d9c2

  • SSDEEP

    98304:NVqahL/HcZbhauXhu+uWB2o2M1Kilm8tMwjqCsXbiDzn4R:Xp/8ZY1+uWpbBew+bbGzn4R

Malware Config

Extracted

Family

sharpstealer

C2

https://api.telegram.org/bot7033943272:AAEy3-KvA1Fs-OvRqrwvT_CCCGrdb1J7SuU/sendMessage?chat_id=7423795300

Attributes
  • max_exfil_filesize

    1.5e+06

  • proxy_port

    168.235.103.57:3128

  • vime_world

    false

aes.plain

Targets

    • Target

      05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N

    • Size

      4.1MB

    • MD5

      67e8b6db3a3d5583a5cbe684159f8270

    • SHA1

      21fff27a12c542129cde65b30d62e0a3bf7f938a

    • SHA256

      05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5

    • SHA512

      979f3e3124f1bd11c2a9f2737bb234475147b4d3ddc016eebe9bbe555faa22ffa1b22f977627cdbf7d49a4d6e76662b0cdaf21e63ec89c2a8409182b3b55d9c2

    • SSDEEP

      98304:NVqahL/HcZbhauXhu+uWB2o2M1Kilm8tMwjqCsXbiDzn4R:Xp/8ZY1+uWpbBew+bbGzn4R

    • Sharp Stealer

      Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks