General
-
Target
ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83
-
Size
340KB
-
Sample
220630-3qzjbscgaq
-
MD5
0dcade2bc331eb3869f54a83761556d0
-
SHA1
1561f63a0120654836a13054b994d9663e3de675
-
SHA256
ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83
-
SHA512
74e54b8c6d941f32b1fa5681bec2be736028b80e504c822238a827592e5c279855f5691f9ab31bb07107e1f72a6d41914a265b71275b4b686d9819df4478caf4
Static task
static1
Behavioral task
behavioral1
Sample
ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
fickerstealer
93.114.128.19:80
Targets
-
-
Target
ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83
-
Size
340KB
-
MD5
0dcade2bc331eb3869f54a83761556d0
-
SHA1
1561f63a0120654836a13054b994d9663e3de675
-
SHA256
ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83
-
SHA512
74e54b8c6d941f32b1fa5681bec2be736028b80e504c822238a827592e5c279855f5691f9ab31bb07107e1f72a6d41914a265b71275b4b686d9819df4478caf4
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-