Behavioral task
behavioral1
Sample
1416-54-0x0000000000400000-0x0000000000467000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1416-54-0x0000000000400000-0x0000000000467000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1416-54-0x0000000000400000-0x0000000000467000-memory.dmp
-
Size
412KB
-
MD5
9b0ec5d2d0a2e6bd1ba83326a028840b
-
SHA1
ee935d96260a9b1064714658a00365c048b48b27
-
SHA256
24290ddbfdb4151253b37da6e85bff4c194bee74689f7d9d9430c75bcc1e9c20
-
SHA512
73fff2ce8d6a45a0207c0756b3c9e22a56719b263f960014d6d56c2f7b63babdf07bcc2731a656c7762b79a647fb26ed4b34d3610c0022a5812c0f7ac4139272
-
SSDEEP
6144:GMYlnAJUEWlv3bV/Ivv57xw33dx4lAcd+cOVThKihKIsX0u+F1vkhlbZRoWxUdcK:GhlnUqvbN8Sti+X430l8C
Malware Config
Extracted
fickerstealer
fickita.info:8080
Signatures
-
Fickerstealer family
Files
-
1416-54-0x0000000000400000-0x0000000000467000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 313KB - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
/4 Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE