General
-
Target
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.zip
-
Size
321KB
-
Sample
221113-2spapsde68
-
MD5
44520c747a6115625b31bf3bebfb1e42
-
SHA1
7c661589981c8998609458408ff24d6c1555403a
-
SHA256
857a0bedfc7e20c1ee7e8af72ad190f0c659b803c8051443ce64095348246c84
-
SHA512
13a889e9678717e8657a6cc83b9fc0964f5c49e795f16200fdf1520601f500776f1b8a4b8d662769855025818a8a8427ea6072bad99350449921771edd2b4cc6
-
SSDEEP
6144:Z6eSaopr5G7m4EnUgh68iYBvAh9zq09xy1LvQt90RDHXbBOMsZcJFyZf1lJQF0E:Z0lG7m4Hgh68i5h9zJ81TM0RROMsZE+Y
Behavioral task
behavioral1
Sample
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
fickerstealer
kefkfkf.link:8080
Targets
-
-
Target
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.exe
-
Size
408KB
-
MD5
7144f017904a36ab19ebf81fe9bf035a
-
SHA1
752b66f7ef137e876e88bb369f369f77a19976d5
-
SHA256
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7
-
SHA512
30e561e621afdb9fa9c73b590dd67e257966cba6b62b899102371fcae1db5a7cbfbed0cc8adee1657c937e3e0587406ab1fa976e603466211203b5fc9de3dfff
-
SSDEEP
12288:yFzPPn2KVdfuXzqSNYOtDw/EaYv59F1o+:Szf2MSfNvtXPv5a+
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-