Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 17:17
Static task
static1
Behavioral task
behavioral1
Sample
2dc65e914b35b462126d324363667c820894ffed94668148ddc920737f5f3eeb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2dc65e914b35b462126d324363667c820894ffed94668148ddc920737f5f3eeb.exe
Resource
win10v2004-20220414-en
General
-
Target
2dc65e914b35b462126d324363667c820894ffed94668148ddc920737f5f3eeb.exe
-
Size
365KB
-
MD5
d1bc13aaf11591fc62884ba865310b81
-
SHA1
d65938ce221f165544ea3ffa3995c81e6b123c34
-
SHA256
2dc65e914b35b462126d324363667c820894ffed94668148ddc920737f5f3eeb
-
SHA512
ddab81a94deaf5371682f0b7fc253a48eea1c41a800eff1567a72805df6875d2bb45b2926fffb69c3585d06d0c21ae2402cf0bc826d014932fc2589d815c4df8
Malware Config
Extracted
fickerstealer
86.106.181.99:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Drops file in System32 directory 1 IoCs
Processes:
2dc65e914b35b462126d324363667c820894ffed94668148ddc920737f5f3eeb.exedescription ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt 2dc65e914b35b462126d324363667c820894ffed94668148ddc920737f5f3eeb.exe -
Drops file in Windows directory 1 IoCs
Processes:
2dc65e914b35b462126d324363667c820894ffed94668148ddc920737f5f3eeb.exedescription ioc Process File opened for modification C:\Windows\ 2dc65e914b35b462126d324363667c820894ffed94668148ddc920737f5f3eeb.exe