General
-
Target
B7D90C9D14D124A163F5B3476160E1CF.exe
-
Size
278KB
-
Sample
210329-pah4tpcr6a
-
MD5
b7d90c9d14d124a163f5b3476160e1cf
-
SHA1
684e0fc52a883091957f65c0d2ff59fe1499bae4
-
SHA256
10192ceb4aa066216989c2b83dd3b460f0264d6672f64d1dff2addbe07fb1a5a
-
SHA512
05be8f906ae6f33ec541a951f3230e0ffcd1f17b9da4bf6e60158bc2ac1c915d5bf2050039672f5cb8479d01e7e7948466e711b574915f35fe109915e8c65ad7
Static task
static1
Behavioral task
behavioral1
Sample
B7D90C9D14D124A163F5B3476160E1CF.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
B7D90C9D14D124A163F5B3476160E1CF.exe
Resource
win10v20201028
Malware Config
Extracted
fickerstealer
deniedfight.com:80
Targets
-
-
Target
B7D90C9D14D124A163F5B3476160E1CF.exe
-
Size
278KB
-
MD5
b7d90c9d14d124a163f5b3476160e1cf
-
SHA1
684e0fc52a883091957f65c0d2ff59fe1499bae4
-
SHA256
10192ceb4aa066216989c2b83dd3b460f0264d6672f64d1dff2addbe07fb1a5a
-
SHA512
05be8f906ae6f33ec541a951f3230e0ffcd1f17b9da4bf6e60158bc2ac1c915d5bf2050039672f5cb8479d01e7e7948466e711b574915f35fe109915e8c65ad7
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-