General
-
Target
78cd287896735ac4617f4fd7d7db3f50.exe
-
Size
386KB
-
Sample
230112-wwfvvacg5x
-
MD5
78cd287896735ac4617f4fd7d7db3f50
-
SHA1
e125d07bcd7967a467a1199a46b42b762170e516
-
SHA256
c292e86c72bcfc610e735fb8eae67990cc834892e4a199a4b20b3e0de5eb14d1
-
SHA512
876ba9542cbf36f695d87418cc068b9c928cc6c38c529d47337a360b9dad4258246df3cf5615c709d06c102c88df66bf5f8458be1d4faabb4b74a5602d592a60
-
SSDEEP
6144:PfILpNo3m+qqwgkFTUeMZiksREwe32RqphF2CoW208q+Zk1x:PfIVNo3mXqOAetXXemR+TSq+Z8x
Static task
static1
Behavioral task
behavioral1
Sample
78cd287896735ac4617f4fd7d7db3f50.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
78cd287896735ac4617f4fd7d7db3f50.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
fickerstealer
ed2efjw.link:8080
Targets
-
-
Target
78cd287896735ac4617f4fd7d7db3f50.exe
-
Size
386KB
-
MD5
78cd287896735ac4617f4fd7d7db3f50
-
SHA1
e125d07bcd7967a467a1199a46b42b762170e516
-
SHA256
c292e86c72bcfc610e735fb8eae67990cc834892e4a199a4b20b3e0de5eb14d1
-
SHA512
876ba9542cbf36f695d87418cc068b9c928cc6c38c529d47337a360b9dad4258246df3cf5615c709d06c102c88df66bf5f8458be1d4faabb4b74a5602d592a60
-
SSDEEP
6144:PfILpNo3m+qqwgkFTUeMZiksREwe32RqphF2CoW208q+Zk1x:PfIVNo3mXqOAetXXemR+TSq+Z8x
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-