General
-
Target
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N
-
Size
4.1MB
-
Sample
240920-bqjz4a1erh
-
MD5
67e8b6db3a3d5583a5cbe684159f8270
-
SHA1
21fff27a12c542129cde65b30d62e0a3bf7f938a
-
SHA256
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5
-
SHA512
979f3e3124f1bd11c2a9f2737bb234475147b4d3ddc016eebe9bbe555faa22ffa1b22f977627cdbf7d49a4d6e76662b0cdaf21e63ec89c2a8409182b3b55d9c2
-
SSDEEP
98304:NVqahL/HcZbhauXhu+uWB2o2M1Kilm8tMwjqCsXbiDzn4R:Xp/8ZY1+uWpbBew+bbGzn4R
Static task
static1
Behavioral task
behavioral1
Sample
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
sharpstealer
https://api.telegram.org/bot7033943272:AAEy3-KvA1Fs-OvRqrwvT_CCCGrdb1J7SuU/sendMessage?chat_id=7423795300
-
max_exfil_filesize
1.5e+06
-
proxy_port
168.235.103.57:3128
-
vime_world
false
Targets
-
-
Target
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N
-
Size
4.1MB
-
MD5
67e8b6db3a3d5583a5cbe684159f8270
-
SHA1
21fff27a12c542129cde65b30d62e0a3bf7f938a
-
SHA256
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5
-
SHA512
979f3e3124f1bd11c2a9f2737bb234475147b4d3ddc016eebe9bbe555faa22ffa1b22f977627cdbf7d49a4d6e76662b0cdaf21e63ec89c2a8409182b3b55d9c2
-
SSDEEP
98304:NVqahL/HcZbhauXhu+uWB2o2M1Kilm8tMwjqCsXbiDzn4R:Xp/8ZY1+uWpbBew+bbGzn4R
-
Sharp Stealer
Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2