Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.zip
-
Size
321KB
-
Sample
221114-lqkxhabf5s
-
MD5
1ce857b3195718d581a243f49af84a51
-
SHA1
144b54f3a7c7bc2e26d75c03dee0bdcb00668bdd
-
SHA256
eb23d2ca85edb18dee60600318e1e8609d054b88a155c352024ca11d2b126fc6
-
SHA512
27d04ababad1d1f60a8ae5d47776ffc5a5610a745d1503bc8e951ddef7c90c9c87e67d9b8d4e740f61a862212fb2370782e8e2effd1c8eedd2ef9090ad15ce54
-
SSDEEP
6144:Z9wiiSwHPtBySbMTOavPTrpo5GmVHMY8JgeaDcF7C7jbm:ZCySbMTVLrpogmVsJ7aaG7Hm
Behavioral task
behavioral1
Sample
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
fickerstealer
kefkfkf.link:8080
Targets
-
-
Target
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.exe
-
Size
408KB
-
MD5
7144f017904a36ab19ebf81fe9bf035a
-
SHA1
752b66f7ef137e876e88bb369f369f77a19976d5
-
SHA256
e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7
-
SHA512
30e561e621afdb9fa9c73b590dd67e257966cba6b62b899102371fcae1db5a7cbfbed0cc8adee1657c937e3e0587406ab1fa976e603466211203b5fc9de3dfff
-
SSDEEP
12288:yFzPPn2KVdfuXzqSNYOtDw/EaYv59F1o+:Szf2MSfNvtXPv5a+
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-