General
-
Target
29373b06e66bff3a24453f138695cc97.exe
-
Size
355KB
-
Sample
221115-anbp9sec47
-
MD5
29373b06e66bff3a24453f138695cc97
-
SHA1
91535e34c0e846aa48cdf8dabdf8c1f4a831a811
-
SHA256
9be708950c3554df320ee4f9089db6c41d2511e1c6fcde4846d620e7e04cb347
-
SHA512
191c987aa6334f9a15e40e5df929347cf9103b110e026a1870a8b7ade396663caa9fc37205c8461384f81d8a72f94a64451d6e662c80ed4d1643569c01200e94
-
SSDEEP
6144:ipK8JqpJLlARQvSOcxvjo+bFO5YDLqqQ2Dd4yik6Is:iptwJ5ARQvSOcBJkcGqQSdLXo
Static task
static1
Behavioral task
behavioral1
Sample
29373b06e66bff3a24453f138695cc97.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
29373b06e66bff3a24453f138695cc97.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
fickerstealer
fickitd.link:8080
Targets
-
-
Target
29373b06e66bff3a24453f138695cc97.exe
-
Size
355KB
-
MD5
29373b06e66bff3a24453f138695cc97
-
SHA1
91535e34c0e846aa48cdf8dabdf8c1f4a831a811
-
SHA256
9be708950c3554df320ee4f9089db6c41d2511e1c6fcde4846d620e7e04cb347
-
SHA512
191c987aa6334f9a15e40e5df929347cf9103b110e026a1870a8b7ade396663caa9fc37205c8461384f81d8a72f94a64451d6e662c80ed4d1643569c01200e94
-
SSDEEP
6144:ipK8JqpJLlARQvSOcxvjo+bFO5YDLqqQ2Dd4yik6Is:iptwJ5ARQvSOcBJkcGqQSdLXo
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-