General
-
Target
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165.zip
-
Size
11.2MB
-
Sample
221114-lqqsrabf61
-
MD5
4e6ab574e820218daee24e70a1191074
-
SHA1
c2a557b62da8236efb9d79cf5949de1f867e3f4c
-
SHA256
ba821d7f91beb342eeb05b315c063e526a2e163b54a887a3a90005eadb815ce7
-
SHA512
f5acb7dfd6d8d761ad39d755c15dc833beaba5c2d5755a3460d34c01f870db2bceb08b219bebb236f342602208c8360457b5bfb77479f485eba3586d788a45aa
-
SSDEEP
196608:xp3kaPV9XT9xhmOqas0ZhERbQUfCXBH0krdUeYiv6AidzwE8g5SHmueUGrO06:rkm9xhmOqa1ExCRNRudzwBgi6U9
Static task
static1
Behavioral task
behavioral1
Sample
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
fickerstealer
prunerflowershop.com:80
Targets
-
-
Target
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165.exe
-
Size
11.7MB
-
MD5
51f468fa1f11ef59ad7fd5f339906661
-
SHA1
03887d2684aff18df484ca39c8f070a0bc725e4a
-
SHA256
1f53d6f4fb02c8663b9d377570953d07c56df297674b7c3847d1697f0e5f8165
-
SHA512
493e7d68f3ffdb6e9b0587457370253f72e3d6b2c6fa3bafb1e96dcb36db0e6b78b2a52bcf86c9b42f1bf260da639a1e88ca13d8a43ad9826ed4f680e9c3ba7f
-
SSDEEP
196608:GPGZKb8EO3ZqySJwUWI/YfH5r7aNXl+MJvZGNod9ldozfoKF2rqIUlHRpSiC:voYZqySi7bfH5qNXzvZLHdozfSOlxpBC
-
Babadeda Crypter
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-