General
-
Target
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165
-
Size
11.7MB
-
Sample
220119-t22y6abeh8
-
MD5
51f468fa1f11ef59ad7fd5f339906661
-
SHA1
03887d2684aff18df484ca39c8f070a0bc725e4a
-
SHA256
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165
-
SHA512
493e7d68f3ffdb6e9b0587457370253f72e3d6b2c6fa3bafb1e96dcb36db0e6b78b2a52bcf86c9b42f1bf260da639a1e88ca13d8a43ad9826ed4f680e9c3ba7f
Static task
static1
Behavioral task
behavioral1
Sample
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
fickerstealer
prunerflowershop.com:80
Targets
-
-
Target
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165
-
Size
11.7MB
-
MD5
51f468fa1f11ef59ad7fd5f339906661
-
SHA1
03887d2684aff18df484ca39c8f070a0bc725e4a
-
SHA256
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165
-
SHA512
493e7d68f3ffdb6e9b0587457370253f72e3d6b2c6fa3bafb1e96dcb36db0e6b78b2a52bcf86c9b42f1bf260da639a1e88ca13d8a43ad9826ed4f680e9c3ba7f
-
Babadeda Crypter
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-