URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as IcarusStealer.

Database Entry


Signature:IcarusStealer
Firstseen:2022-10-02 06:08:17 UTC
Lastseen:2024-10-05 17:14:14 UTC
Unique Payloads:5
URLs:5

Payload


The table below shows all payloads that have been identified as IcarusStealer.

Firstseen (UTC)SHA256File TypeFile sizeVT
2024-10-05 17:14:143ff0d50557b5ba7eb306048c0e20dd4304a75aeab0470fe213c5089a031a396fExecutable exe4'038'008Virustotal results 33 / 71 (46.48)
2023-01-24 07:56:057326c74c3a8ddde3323592e29e1042c886f3850b14e7a79a178ef693a5ba1eaeExecutable exe934'912Virustotal results 16 / 70 (22.86)
2023-01-24 06:15:14f5f46421a484bc7823996d330658a7e86ecb594ff258a157051997917c907e0eExecutable exe880'128Virustotal results 25 / 70 (35.71)
2023-01-23 18:58:058ef6e0473f2d5b941b20e99fa95643b12ddac9e4eb0e39d71cc4cada440f8634Executable exe1'071'616n/a
2022-10-02 06:08:17d3544b079602557b6633eeba817ba5131d7069a5be7bd6b22dfdafee844512dcExecutable exe801'792n/a

Number of entries displayed: 5 (max: 1'000)