Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2022 06:57
Static task
static1
Behavioral task
behavioral1
Sample
59a6c1ed3330380a2e3c7671029777e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
59a6c1ed3330380a2e3c7671029777e5.exe
Resource
win10v2004-20220901-en
General
-
Target
59a6c1ed3330380a2e3c7671029777e5.exe
-
Size
375KB
-
MD5
59a6c1ed3330380a2e3c7671029777e5
-
SHA1
71cc876b0003c55b548f9de7fde38c14a33e7a74
-
SHA256
3b9208447ad1e6a191918e6e2b71d26566ec3dd62ed3e2c1145c7bbdc786da3d
-
SHA512
2a7412bd5fdefb11852dba39db00491f9ee97a896b58e810691509782cc065d2e08564036e28b0b9fcda9410feb3c753364b3aad61026d2c3fcffad0069a1c8f
-
SSDEEP
6144:ztcTLgoQG1PuXv5OAikSItDFXF4SOsCXxMlgEi:ztkkoQG1uf5OALtlF0JXxMGEi
Malware Config
Extracted
fickerstealer
kefkfkf.link:8080
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
59a6c1ed3330380a2e3c7671029777e5.exedescription pid Process procid_target PID 4964 set thread context of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
59a6c1ed3330380a2e3c7671029777e5.exedescription pid Process procid_target PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85 PID 4964 wrote to memory of 632 4964 59a6c1ed3330380a2e3c7671029777e5.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\59a6c1ed3330380a2e3c7671029777e5.exe"C:\Users\Admin\AppData\Local\Temp\59a6c1ed3330380a2e3c7671029777e5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\59a6c1ed3330380a2e3c7671029777e5.exe"C:\Users\Admin\AppData\Local\Temp\59a6c1ed3330380a2e3c7671029777e5.exe"2⤵PID:632
-