General
-
Target
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.zip
-
Size
6.8MB
-
Sample
221114-lqmfbsge53
-
MD5
26c9ec80b2c669f2c22d1a1612c9639d
-
SHA1
662b72c75007c242effe641efe2b27a4377033ab
-
SHA256
efa58527c2ea6f32f174cbf016edc4fe1eacc226dbd88104b323c79437702e4c
-
SHA512
d13c7a3ee5ad4663496f4697d488436a9fb4ea2cc5dbe122c0dab4265a16634737df7c38ff55292cb012160c3075511b727514583f3a174dce4483cb9a987d90
-
SSDEEP
98304:xMF+z48d6LJF4JO3TPmvcXjZAnfSn5ewMGAOyoyC3apsUrSkhD9oul4tg8qWBhpM:x9z48sLJprKA26ncNBXmrQFl4tgPa6
Static task
static1
Behavioral task
behavioral1
Sample
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
fickerstealer
45.142.212.149:80
Targets
-
-
Target
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee.exe
-
Size
8.9MB
-
MD5
04befedbe76440e1e24e59ff4244ce6a
-
SHA1
a8a2d779abb35bf23ba21575af1e95a2ecd17265
-
SHA256
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee
-
SHA512
fa52f5bf9327ba9aade2cf8cc115b824761f45fe195079ec5738f71258e4cac8b1b33b3fba3954aef7aef92c44de47f249d3109f56f798f5ad7be49d9d37f0f2
-
SSDEEP
196608:YwX6s+9/A4IlpYpvG2OF+n4XRg2SS20yfdVJMjOK:YwX6s+9boYAhbgAy1vMKK
Score10/10-
Babadeda Crypter
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-