General
-
Target
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9.exe
-
Size
484KB
-
Sample
230123-s4rqjaea22
-
MD5
858df84cee719d555d9c0e734e85e134
-
SHA1
5f041464895c49dc9fe0c3e156f0fb0511e6ad77
-
SHA256
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8
-
SHA512
4558fa0d39c7a88b9a92bc67256e67507d2b9602512e83dd4bba1209d08ea42b683d5ce1684a90576769db39d923aa0ca0f3deed5d3743fa92b45c0bb588a88b
-
SSDEEP
6144:cLD0cELbVdOkFuWupKYAbRjXXRQGOQ1k5W/HJXAiTACzKIugCoZsBf7jO5+:cn0b/VdJgKflXXRX/JQiTpnug6OQ
Static task
static1
Behavioral task
behavioral1
Sample
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
fickerstealer
wejqwed.link:8080
Targets
-
-
Target
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9.exe
-
Size
484KB
-
MD5
858df84cee719d555d9c0e734e85e134
-
SHA1
5f041464895c49dc9fe0c3e156f0fb0511e6ad77
-
SHA256
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8
-
SHA512
4558fa0d39c7a88b9a92bc67256e67507d2b9602512e83dd4bba1209d08ea42b683d5ce1684a90576769db39d923aa0ca0f3deed5d3743fa92b45c0bb588a88b
-
SSDEEP
6144:cLD0cELbVdOkFuWupKYAbRjXXRQGOQ1k5W/HJXAiTACzKIugCoZsBf7jO5+:cn0b/VdJgKflXXRX/JQiTpnug6OQ
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-