General
-
Target
library_2.exe
-
Size
508KB
-
Sample
221111-g4b5asbgcj
-
MD5
88367344c224ae3ed9030cfcb389184a
-
SHA1
a9b8a7f5ce5059e1423b5399199d3f7398956329
-
SHA256
6df186c3d5c563f492abed3e125ba4603f726bd1d257d4343f59d1584c0736db
-
SHA512
a41cfa28fe323d3e69cf94145e97a41df59bff253acd7e377602d0cdfcf93416b8df0cc7c18c8514be8fd9999092124d132ac374e43110afc3d6a55d362e2f38
-
SSDEEP
6144:g/1z+5QuL0f5QjKeVgv+v8mZFU2WKXFetnnOX7DKjimqcZfRPJXwOu1qlb:g/l8Qf5ct8A9WkFAnOXSqSJUqlb
Static task
static1
Behavioral task
behavioral1
Sample
library_2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
library_2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
fickerstealer
fickitc.link:8080
Targets
-
-
Target
library_2.exe
-
Size
508KB
-
MD5
88367344c224ae3ed9030cfcb389184a
-
SHA1
a9b8a7f5ce5059e1423b5399199d3f7398956329
-
SHA256
6df186c3d5c563f492abed3e125ba4603f726bd1d257d4343f59d1584c0736db
-
SHA512
a41cfa28fe323d3e69cf94145e97a41df59bff253acd7e377602d0cdfcf93416b8df0cc7c18c8514be8fd9999092124d132ac374e43110afc3d6a55d362e2f38
-
SSDEEP
6144:g/1z+5QuL0f5QjKeVgv+v8mZFU2WKXFetnnOX7DKjimqcZfRPJXwOu1qlb:g/l8Qf5ct8A9WkFAnOXSqSJUqlb
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-