General
-
Target
fbac8499f9b9374327cb08b0a19a09da2e26f464bf082708db77228a44277f0c
-
Size
3.6MB
-
Sample
220630-3p82daede7
-
MD5
a2c7a93f123d477aeb5cd0c87e95711f
-
SHA1
d2159c9274e01d44217f04d7491a9ab899b6e1c2
-
SHA256
fbac8499f9b9374327cb08b0a19a09da2e26f464bf082708db77228a44277f0c
-
SHA512
ec89e133346ad53af32c584f27129cfd5d62d85b2990136f696b2dc3aba7b2919b3e30e8081b880fb219f694d56f3bb02eb03a8484f7c160ccee435f3aa21109
Static task
static1
Behavioral task
behavioral1
Sample
fbac8499f9b9374327cb08b0a19a09da2e26f464bf082708db77228a44277f0c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fbac8499f9b9374327cb08b0a19a09da2e26f464bf082708db77228a44277f0c.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
fickerstealer
194.99.20.202:80
Extracted
amadey
2.08
194.32.77.37/pPpfs3ds3Za/index.php
Targets
-
-
Target
fbac8499f9b9374327cb08b0a19a09da2e26f464bf082708db77228a44277f0c
-
Size
3.6MB
-
MD5
a2c7a93f123d477aeb5cd0c87e95711f
-
SHA1
d2159c9274e01d44217f04d7491a9ab899b6e1c2
-
SHA256
fbac8499f9b9374327cb08b0a19a09da2e26f464bf082708db77228a44277f0c
-
SHA512
ec89e133346ad53af32c584f27129cfd5d62d85b2990136f696b2dc3aba7b2919b3e30e8081b880fb219f694d56f3bb02eb03a8484f7c160ccee435f3aa21109
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-