General
-
Target
8372457153.zip
-
Size
269KB
-
Sample
221109-gcmrqafgen
-
MD5
523931d39910e2c400431342b8de4bbc
-
SHA1
d98b8f3b13014d1e9e19f1b6a1a12ede4bfb1cc1
-
SHA256
6865ac77cfa3647f8751bdcd4c3b306f41a48b8dba35f6f01c98439c7da9261c
-
SHA512
cf0d678b39201039c491dbeac284cb68bdc585da93c87eaf2e0bae7c5ef939be3f0e2b4604356a6fbc1b99e14e1607c84ebc6a29ad8f7db94c2c18230d737efd
-
SSDEEP
6144:Vc5WXmevxAvjTFCaVJhoE0oFXZ1e4qza6xNmwL:OWXmlvEAJbzpZ1erz/n
Static task
static1
Behavioral task
behavioral1
Sample
3fb6dc0a224d2f078b3d612418164610b6d75a443feaf3d86c05ed450d0dfb6e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3fb6dc0a224d2f078b3d612418164610b6d75a443feaf3d86c05ed450d0dfb6e.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
fickerstealer
fickitc.link:8080
Targets
-
-
Target
3fb6dc0a224d2f078b3d612418164610b6d75a443feaf3d86c05ed450d0dfb6e
-
Size
318KB
-
MD5
8852c3aa866b43ac160985259a936909
-
SHA1
07224a27906830ccfc639fc40f22b70c42f474f5
-
SHA256
3fb6dc0a224d2f078b3d612418164610b6d75a443feaf3d86c05ed450d0dfb6e
-
SHA512
6680d0c67dd1f01464bb75e55cd13bdab9f6ec25e8651713b18b0a480ac518d702d4dd056fbf04c2906599a509692b1d9e4ec2d5d299d7301d82ad8f8d9d1ef9
-
SSDEEP
6144:Q7LVMEVRcd8F0CEWFCOgysfF1OOjOMPi2SZhqZ2NBxu27hRRJb:O5MEVRK+0C3COPQhjOMPiBAZsBxD7/Rh
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-