Combine cutting-edge XDR technology, multi-signal threat intelligence and 24/7 Elite Threat Hunters to help you build a world-class security operation.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Cyber risk and advisory programs that identify security gaps and build security strategies to address them.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
XDR with machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Seamless integration and threat investigation across your existing tech stack.
Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Extend your team capabilities and prevent business disruption with expertise from eSentire.
We balance automated blocks with rapid human-led investigations to manage threats.
Guard endpoints by isolating and remediating threats to prevent lateral spread.
Defend brute force attacks, active intrusions and unauthorized scans.
Investigation and threat detection across multi-cloud or hybrid environments.
Remediate misconfigurations, vulnerabilities and policy violations.
Investigate and respond to compromised identities and insider threats.
Stop ransomware before it spreads.
Meet regulatory compliance mandates.
Detect and respond to zero-day exploits.
End misconfigurations and policy violations.
Defend third-party and supply chain risk.
Prevent disruption by outsourcing MDR.
Adopt a risk-based security approach.
Meet insurability requirements with MDR.
Protect your most sensitive data.
Build a proven security program.
Operationalize timely, accurate, and actionable cyber threat intelligence.
THE THREAT In recent weeks, eSentire’s Threat Response Unit (TRU) has traced numerous email account compromise cases to infrastructure hosted on several related hosting…
Dec 10, 2024THE THREATUpdate: Security patches to address this vulnerability were released by Cleo on December 12th. Organizations need to update to Cleo Harmony, VLTrader, and LexiCom versions…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Three MDR package tiers are available based on per-user pricing and level of risk tolerance.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
First introduced in July 2022, Icarus Stealer is an infostealer malware that uses an hVNC capability so that the threat actor can create a new hidden desktop to navigate through the infected computer system without interacting with the main desktop. Icarus Stealer is also significantly cheaper compared to other popular infostealers like Redline Stealer and Raccoon Stealer, making it easier for inexperienced cybercriminals to use.
This malware analysis delves deeper into the technical details of how the Icarus Stealer malware operates and our security recommendations to protect your organization from being exploited.
First mention of Icarus Stealer appeared on hacking forums in July 2022 (Figure 1).
Icarus stealer claims to have numerous functionalities that include 2FA bypass, rootkit hVNC, encrypted connection, XOR/AES payload encryption, a fake login page, shellcode payload, export the payload as macro, RunPE (process hollowing technique), Telegram stealers, Discord stealers, password recovery and more (Figure 2).
What makes Icarus Stealer different from other stealers such as Raccoon Stealer and Redline Stealer is that it uses an hVNC (Hidden Virtual Network Computing) capability, which lets an attacker create a new hidden desktop to navigate through the computer system without interacting with the main desktop.
A normal user would not notice any interactions from the attacker in the main desktop unless they open the Task Manager. Icarus Stealer provides the ability to build a stub for .NET 2 (if the payload is generated to run on Windows 7) and .NET 4 (for the payloads on Windows 8 and up) versions. Stub is a separate part of the malware which the encrypted malware is tied to.
When the malware startups, the stub would begin to decrypt the malware that was initially encrypted with a crypter and run it in memory. This is used to bypass signature and heuristic-based detections.
The stealer is sold for $79.99/month, $189.99/3 months, $299.99/6 months, and $899.99 for a lifetime access, which is significantly cheaper compared to Redline Stealer and Raccoon Stealer, which are $150 and $275 per month respectively.
Icarus Stealer is also distributed by other users on Telegram channels (Figure 4).
One of the main functionalities of Icarus Stealer is the Payload Builder (Figure 5). An attacker can manually specify the listener port to keep a constant connection with the infected machines. The default listening port is 8880.
The default name tag for the Icarus Stealer client is Icarus_Client but the threat actor can modify the name. The payload file name generation is randomized, and the filename can be customized by a malicious actor. Some of the Icarus Stealer features include:
AES and XOR encryption can be applied during the batch payload generation. The keys are randomly generated by the stealer as shown in Figure 27.
Upon the execution of the encrypted batch payload, the renamed PowerShell application is dropped into the working directory to decrypt the batch file. An example of the XOR and AES encryptions are shown in Figures 28-29.
The main hVNC panel (Figure 30) contains the following options:
The list of wallets that Icarus exfiltrates from the browser extensions:
Wallet |
Wallet Extension |
Chrome_Binance |
fhbohimaelbohpjbbldcngcnapndodjp |
Chrome_Bitapp |
fihkakfobkmkjojpchpfgcmhfjnmnfpi |
Chrome_Coin98 |
aeachknmefphepccionboohckonoeemg |
Chrome_Equal |
blnieiiffboillknjnepogjhkgnoapac |
Chrome_Guild |
nanjmdknhkinifnkgdcggcfnhdaammmj |
Chrome_Iconex |
flpiciilemghbmfalicajoolhkkenfel |
Chrome_Math |
afbcbjpbpfadlkmhmclhkeeodmamcflc |
Chrome_Mobox |
fcckkdbjnoikooededlapcalpionmalo |
Chrome_Phantom |
bfnaelmomeimhlpmgjnjophhpkkoljpa |
Chrome_Tron |
ibnejdfjmmkpcnlpebklmnkoeoihofec |
Chrome_XinPay |
bocpokimicclpaiekenaeelehdjllofo |
Chrome_Ton |
nphplpgoakhhjchkkhmiggakijnkhfnd |
Chrome_Metamask |
nkbihfbeogaeaoehlefnkodbefgpgknn |
Chrome_Sollet |
fhmfendgdocmcbmfikdcogofphimnkno |
Chrome_Slope |
pocmplpaccanhmnllbbkpgfliimjljgo |
Chrome_Starcoin |
mfhbebgoclkghebffdldpobeajmbecfk |
Chrome_Swash |
cmndjbecilbocjfkibfbifhngkdmjgog |
Chrome_Finnie |
cjmkndjhnagcfbpiemnkdpomccnjblmj |
Chrome_Keplr |
dmkamcknogkgcdfhhbddcghachkejeap |
Chrome_Crocobit |
pnlfjmlcjdjgkddecgincndfgegkecke |
Chrome_Oxygen |
fhilaheimglignddkjgofkcbgekhenbh |
Chrome_Nifty |
jbdaocneiiinmjbjlgalhcelgbejmnid |
Chrome_Liquality |
kpfopkelmapcoipemfendmdcghnegimn |
Edge_Auvitas |
klfhbdnlcfcaccoakhceodhldjojboga |
Edge_Metamask |
ejbalbakoplchlghecdalmeeeajnimhm |
Edge_Petrinax |
oooiblbdpdlecigodndinbpfopomaegl |
Edge_Rabet |
aanjhgiamnacdfnlfnmgehjikagdbafd |
Edge_Ronin |
bblmcdckkhkhfhhpfcchlpalebmonecp |
Edge_Yoroi |
akoiaibnepcedcplijmiamnaigbepmcb |
Edge_Zilpay |
Fbekallmnjoeggkefjkbebpineneilec |
Edge_Exodus |
jdiccldimpdaibmpdkjnbmckianbfold |
Edge_Terra_Station |
ajkhoeiiokighlmdnlakpjfoobnjinie |
Edge_Jaxx |
dmdimapfghaakeibppbfeokhgoikeoci |
The list of wallets fingerprinted on the host:
\AppData\Roaming\Armory |
\AppData\Local\Coinomi |
\AppData\Local\Programs\Guarda\Guarda.exe, |
\AppData\Roaming\Guarda, \AppData\Roaming\Exodus |
\AppData\Local\Programs\atomic, \AppData\Roaming\atomic |
\AppData\Local\Programs\com.liberty.jaxx, \AppData\Roaming\com.liberty.jaxx |
\AppData\Roaming\Electrum |
The stealer exfiltrates credentials from the following browsers:
Our Threat Response Unit (TRU) combines threat intelligence obtained from research and security incidents to create action-oriented outcomes for our customers. We are taking a full-scale response approach to fight modern cybersecurity threats by deploying countermeasures, such as:
Our detection content is supported by investigation runbooks, ensuring our SOC (Security Operations Center) analysts respond rapidly to any intrusion attempts related to a known malware Tactics, Techniques, and Procedures. In addition, TRU closely monitors the threat landscape and constantly addresses capability gaps and conducts retroactive threat hunts to assess customer impact.
We recommend implementing the following controls to help secure your organization against Icarus Stealer malware:
While the TTPs used by adversaries grow in sophistication, they lead to a certain level of difficulties at which critical business decisions must be made. Preventing the various attack paths utilized by the modern threat actor requires actively monitoring the threat landscape, developing, and deploying endpoint detection, and the ability to investigate logs & network data during active intrusions.
eSentire’s TRU is a world-class team of threat researchers who develop new detections enriched by original threat intelligence and leverage new machine learning models that correlate multi-signal data and automate rapid response to advanced threats.
If you are not currently engaged with an MDR provider, eSentire MDR can help you reclaim the advantage and put your business ahead of disruption.
Learn what it means to have an elite team of Threat Hunters and Researchers that works for you. Connect with an eSentire Security Specialist.
Main C2 Server |
193.31.116[.]239 |
r77-x64.dll |
8d54e4abe1762f96134a0c874cfb8cdc |
r77-x86.dll |
bf2ac81c25ebc55e88af9233c6c0e1b5 |
bb.jpg (Bot Killer) |
735ad7684fdb6230972cf600980c0392 |
AdvKillBot.jpg (CCleaner) |
348bf87a67949890a3b6229cae3f767d |
rt.jpg (rootkit) |
f09903496c341436ce74625bbaafeb81 |
MITRE ATT&CK Tactic |
ID |
MITRE ATT&CK Technique |
Description |
MITRE ATT&CK TacticExecution |
IDT1204.002 |
MITRE ATT&CK TechniqueUser Execution: Malicious File |
DescriptionExecution via a malicious executable |
MITRE ATT&CK TacticPersistence |
IDT1053.005 T1546.010 T1546.015 |
MITRE ATT&CK TechniqueScheduled Task/Job: Scheduled Task Event Triggered Execution: AppInit DLLs Event Triggered Execution: Component Object Model Hijacking |
DescriptionFor Icarus Stealer the persistence is achieved via scheduled tasks. For the rootkit component – the persistence is achieved via AppInit DLLs. The rootkit also hijacks hijacks the Default value within the registry path HKCU\Software\CLASSES\ms-settings\shell\open\command with the rootkit installer binary and changes DelegateExecute to 0 |
MITRE ATT&CK TacticPrivilege Escalation |
IDT1548.002 T1497.001 |
MITRE ATT&CK TechniqueAbuse Elevation Control Mechanism: Bypass User Account Control |
DescriptionThe stealer attempts to bypass UAC using ComputerDefaults.exe |
MITRE ATT&CK TacticDefense Evasion |
IDT1036.004 T1622 |
MITRE ATT&CK TechniqueMasquerading: Masquerade Task or Service Virtualization/Sandbox Evasion: System Checks Debugger Evasion |
DescriptionThe stealer can masquerade under svchost.exe. The macro feature contains the sandbox checks – the stealer counts number of recently opened files and if it is less than 3 then the macro exits; the Icarus Stealer also checks if it’s running within VMWare on VirtualBox environments. The stealer uses IsDebuggerPresent API to check if it’s being debugged |
MITRE ATT&CK TacticProcess Injection |
IDT1055 |
DescriptionIcarus Stealer injects itself into cvtres.exe process |
|
MITRE ATT&CK TacticCredential Access |
IDTA0006 |
DescriptionIcarus Stealer exfiltrates sensitive browsing data and cryptowallets |
|
MITRE ATT&CK TacticDiscovery |
IDT1057 T1518 T1082 |
MITRE ATT&CK TechniqueProcess Discovery Software Discovery System Information Discovery |
DescriptionThe stealer performs the process, application and host information discovery |
The eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.