General
-
Target
7307504c768758f009452b1bd991812ecdd6f57c0fe33d06b237303b4a72ec38
-
Size
301KB
-
Sample
221003-r1rqpabdhq
-
MD5
376538e41f3b495aea16455ea56bd559
-
SHA1
ff85303f6c40adde8bf1e0b3925bca0155decf22
-
SHA256
7307504c768758f009452b1bd991812ecdd6f57c0fe33d06b237303b4a72ec38
-
SHA512
b2f8bdd0a6128adcbcb39b947e16104c25421e4deccc1a2da3a7c506f87e77eec1ebedefa7029d04a31c21fa48e3d6c7fe2c26f835ba9af4fcd0bb1c2dec48e5
-
SSDEEP
6144:EMZZBGFZHsaapDKK58c6WXeKZJLL61aEygn22/5+gRhp4wGl:EMZXyMhpp58cduKrLL61T42/5+IYwGl
Static task
static1
Behavioral task
behavioral1
Sample
7307504c768758f009452b1bd991812ecdd6f57c0fe33d06b237303b4a72ec38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7307504c768758f009452b1bd991812ecdd6f57c0fe33d06b237303b4a72ec38.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
fickerstealer
linkappc.link:8080
Targets
-
-
Target
7307504c768758f009452b1bd991812ecdd6f57c0fe33d06b237303b4a72ec38
-
Size
301KB
-
MD5
376538e41f3b495aea16455ea56bd559
-
SHA1
ff85303f6c40adde8bf1e0b3925bca0155decf22
-
SHA256
7307504c768758f009452b1bd991812ecdd6f57c0fe33d06b237303b4a72ec38
-
SHA512
b2f8bdd0a6128adcbcb39b947e16104c25421e4deccc1a2da3a7c506f87e77eec1ebedefa7029d04a31c21fa48e3d6c7fe2c26f835ba9af4fcd0bb1c2dec48e5
-
SSDEEP
6144:EMZZBGFZHsaapDKK58c6WXeKZJLL61aEygn22/5+gRhp4wGl:EMZXyMhpp58cduKrLL61T42/5+IYwGl
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-