What We Do
How We Do
Resources
Company
Partners
Get Started
Blog

eSentire Threat Intelligence Malware Analysis: Icarus Stealer

BY eSentire Threat Response Unit (TRU)

February 13, 2023 | 15 MINS READ

Attacks/Breaches

Threat Intelligence

Threat Response Unit

TRU Positive/Bulletin

Want to learn more on how to achieve Cyber Resilience?

TALK TO AN EXPERT

IN THIS POST

First introduced in July 2022, Icarus Stealer is an infostealer malware that uses an hVNC capability so that the threat actor can create a new hidden desktop to navigate through the infected computer system without interacting with the main desktop. Icarus Stealer is also significantly cheaper compared to other popular infostealers like Redline Stealer and Raccoon Stealer, making it easier for inexperienced cybercriminals to use.

This malware analysis delves deeper into the technical details of how the Icarus Stealer malware operates and our security recommendations to protect your organization from being exploited.

Key Takeaways

  • Icarus Stealer is yet another newly emerged stealer providing some of the unique features which includes the rootkit and hVNC (Hidden Virtual network computing).
  • The stealer developer is consistently updating the stealer and adding new capabilities such as generating the payload as VBS, Kill Bot and CCleaner.
  • The stealer has a wide range of features and capabilities, which makes it easier for an inexperienced malicious actor to deploy.

The Project Icarus Case Study

First mention of Icarus Stealer appeared on hacking forums in July 2022 (Figure 1).

Figure 1: First appearance of Icarus Stealer on hacking forums

Icarus stealer claims to have numerous functionalities that include 2FA bypass, rootkit hVNC, encrypted connection, XOR/AES payload encryption, a fake login page, shellcode payload, export the payload as macro, RunPE (process hollowing technique), Telegram stealers, Discord stealers, password recovery and more (Figure 2).

Figure 2: Advertised Icarus Stealer capabilities

What makes Icarus Stealer different from other stealers such as Raccoon Stealer and Redline Stealer is that it uses an hVNC (Hidden Virtual Network Computing) capability, which lets an attacker create a new hidden desktop to navigate through the computer system without interacting with the main desktop.

A normal user would not notice any interactions from the attacker in the main desktop unless they open the Task Manager. Icarus Stealer provides the ability to build a stub for .NET 2 (if the payload is generated to run on Windows 7) and .NET 4 (for the payloads on Windows 8 and up) versions. Stub is a separate part of the malware which the encrypted malware is tied to.

When the malware startups, the stub would begin to decrypt the malware that was initially encrypted with a crypter and run it in memory. This is used to bypass signature and heuristic-based detections.

The stealer is sold for $79.99/month, $189.99/3 months, $299.99/6 months, and $899.99 for a lifetime access, which is significantly cheaper compared to Redline Stealer and Raccoon Stealer, which are $150 and $275 per month respectively.

Figure 3: Icarus Stealer price list

Icarus Stealer is also distributed by other users on Telegram channels (Figure 4).

Figure 4: Icarus Stealer distributed by another user on Telegram

Icarus Stealer Analysis

One of the main functionalities of Icarus Stealer is the Payload Builder (Figure 5). An attacker can manually specify the listener port to keep a constant connection with the infected machines. The default listening port is 8880.

Figure 5: Payload Builder panel

The default name tag for the Icarus Stealer client is Icarus_Client but the threat actor can modify the name. The payload file name generation is randomized, and the filename can be customized by a malicious actor. Some of the Icarus Stealer features include:

AES and XOR encryption can be applied during the batch payload generation. The keys are randomly generated by the stealer as shown in Figure 27.

Figure 27: AES/XOR batch encryption

Upon the execution of the encrypted batch payload, the renamed PowerShell application is dropped into the working directory to decrypt the batch file. An example of the XOR and AES encryptions are shown in Figures 28-29.

Figure 28: XOR encryption
Figure 29: AES encryption

The main hVNC panel (Figure 30) contains the following options:

The list of wallets that Icarus exfiltrates from the browser extensions:

Wallet

Wallet Extension

Chrome_Binance

fhbohimaelbohpjbbldcngcnapndodjp

Chrome_Bitapp

fihkakfobkmkjojpchpfgcmhfjnmnfpi

Chrome_Coin98

aeachknmefphepccionboohckonoeemg

Chrome_Equal

blnieiiffboillknjnepogjhkgnoapac

Chrome_Guild

nanjmdknhkinifnkgdcggcfnhdaammmj

Chrome_Iconex

flpiciilemghbmfalicajoolhkkenfel

Chrome_Math

afbcbjpbpfadlkmhmclhkeeodmamcflc

Chrome_Mobox

fcckkdbjnoikooededlapcalpionmalo

Chrome_Phantom

bfnaelmomeimhlpmgjnjophhpkkoljpa

Chrome_Tron

ibnejdfjmmkpcnlpebklmnkoeoihofec

Chrome_XinPay

bocpokimicclpaiekenaeelehdjllofo

Chrome_Ton

nphplpgoakhhjchkkhmiggakijnkhfnd

Chrome_Metamask

nkbihfbeogaeaoehlefnkodbefgpgknn

Chrome_Sollet

fhmfendgdocmcbmfikdcogofphimnkno

Chrome_Slope

pocmplpaccanhmnllbbkpgfliimjljgo

Chrome_Starcoin

mfhbebgoclkghebffdldpobeajmbecfk

Chrome_Swash

cmndjbecilbocjfkibfbifhngkdmjgog

Chrome_Finnie

cjmkndjhnagcfbpiemnkdpomccnjblmj

Chrome_Keplr

dmkamcknogkgcdfhhbddcghachkejeap

Chrome_Crocobit

pnlfjmlcjdjgkddecgincndfgegkecke

Chrome_Oxygen

fhilaheimglignddkjgofkcbgekhenbh

Chrome_Nifty

jbdaocneiiinmjbjlgalhcelgbejmnid

Chrome_Liquality

kpfopkelmapcoipemfendmdcghnegimn

Edge_Auvitas

klfhbdnlcfcaccoakhceodhldjojboga

Edge_Metamask

ejbalbakoplchlghecdalmeeeajnimhm

Edge_Petrinax

oooiblbdpdlecigodndinbpfopomaegl

Edge_Rabet

aanjhgiamnacdfnlfnmgehjikagdbafd

Edge_Ronin

bblmcdckkhkhfhhpfcchlpalebmonecp

Edge_Yoroi

akoiaibnepcedcplijmiamnaigbepmcb

Edge_Zilpay

Fbekallmnjoeggkefjkbebpineneilec

Edge_Exodus

jdiccldimpdaibmpdkjnbmckianbfold

Edge_Terra_Station

ajkhoeiiokighlmdnlakpjfoobnjinie

Edge_Jaxx

dmdimapfghaakeibppbfeokhgoikeoci

The list of wallets fingerprinted on the host:

\AppData\Roaming\Armory

\AppData\Local\Coinomi

\AppData\Local\Programs\Guarda\Guarda.exe,

\AppData\Roaming\Guarda, \AppData\Roaming\Exodus

\AppData\Local\Programs\atomic, \AppData\Roaming\atomic

\AppData\Local\Programs\com.liberty.jaxx, \AppData\Roaming\com.liberty.jaxx

\AppData\Roaming\Electrum

The stealer exfiltrates credentials from the following browsers:

How eSentire is Responding

Our Threat Response Unit (TRU) combines threat intelligence obtained from research and security incidents to create action-oriented outcomes for our customers. We are taking a full-scale response approach to fight modern cybersecurity threats by deploying countermeasures, such as: 

Our detection content is supported by investigation runbooks, ensuring our SOC (Security Operations Center) analysts respond rapidly to any intrusion attempts related to a known malware Tactics, Techniques, and Procedures. In addition, TRU closely monitors the threat landscape and constantly addresses capability gaps and conducts retroactive threat hunts to assess customer impact.

Recommendations from eSentire’s Threat Response Unit (TRU) 

We recommend implementing the following controls to help secure your organization against Icarus Stealer malware:

While the TTPs used by adversaries grow in sophistication, they lead to a certain level of difficulties at which critical business decisions must be made. Preventing the various attack paths utilized by the modern threat actor requires actively monitoring the threat landscape, developing, and deploying endpoint detection, and the ability to investigate logs & network data during active intrusions.

eSentire’s TRU is a world-class team of threat researchers who develop new detections enriched by original threat intelligence and leverage new machine learning models that correlate multi-signal data and automate rapid response to advanced threats.

If you are not currently engaged with an MDR provider, eSentire MDR can help you reclaim the advantage and put your business ahead of disruption.

Learn what it means to have an elite team of Threat Hunters and Researchers that works for you. Connect with an eSentire Security Specialist.

Appendix

Indicators of Compromise

Main C2 Server

193.31.116[.]239

r77-x64.dll

8d54e4abe1762f96134a0c874cfb8cdc

r77-x86.dll

bf2ac81c25ebc55e88af9233c6c0e1b5

bb.jpg (Bot Killer)

735ad7684fdb6230972cf600980c0392

AdvKillBot.jpg (CCleaner)

348bf87a67949890a3b6229cae3f767d

rt.jpg (rootkit)

f09903496c341436ce74625bbaafeb81

MITRE ATT&CK

MITRE ATT&CK Tactic

ID

MITRE ATT&CK Technique

Description

MITRE ATT&CK Tactic

Execution

ID

T1204.002

MITRE ATT&CK Technique

User Execution: Malicious File

Description

Execution via a malicious executable

MITRE ATT&CK Tactic

Persistence

ID

T1053.005

T1546.010

T1546.015

MITRE ATT&CK Technique

Scheduled Task/Job: Scheduled Task

Event Triggered Execution: AppInit DLLs

Event Triggered Execution: Component Object Model Hijacking

Description

For Icarus Stealer the persistence is achieved via scheduled tasks.

For the rootkit component – the persistence is achieved via AppInit DLLs.

The rootkit also hijacks hijacks the Default value within the registry path HKCU\Software\CLASSES\ms-settings\shell\open\command with the rootkit installer binary and changes DelegateExecute to 0

MITRE ATT&CK Tactic

Privilege Escalation

ID

T1548.002

T1497.001

MITRE ATT&CK Technique

Abuse Elevation Control Mechanism: Bypass User Account Control

Description

The stealer attempts to bypass UAC using ComputerDefaults.exe

MITRE ATT&CK Tactic

Defense Evasion

ID

T1036.004

T1622

MITRE ATT&CK Technique

Masquerading: Masquerade Task or Service

Virtualization/Sandbox Evasion: System Checks

Debugger Evasion

Description

The stealer can masquerade under svchost.exe.

The macro feature contains the sandbox checks – the stealer counts number of recently opened files and if it is less than 3 then the macro exits; the Icarus Stealer also checks if it’s running within VMWare on VirtualBox environments.

The stealer uses IsDebuggerPresent API to check if it’s being debugged

MITRE ATT&CK Tactic

Process Injection

ID

T1055

Description

Icarus Stealer injects itself into cvtres.exe process

MITRE ATT&CK Tactic

Credential Access

ID

TA0006

Description

Icarus Stealer exfiltrates sensitive browsing data and cryptowallets

MITRE ATT&CK Tactic

Discovery

ID

T1057

T1518

T1082

MITRE ATT&CK Technique

Process Discovery

Software Discovery

System Information Discovery

Description

The stealer performs the process, application and host information discovery

eSentire Threat Response Unit (TRU)
eSentire Threat Response Unit (TRU)

The eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.

Read the Latest from eSentire