Malware Analysis Report

2024-09-22 16:23

Sample ID 230321-qq67ysaf32
Target ca47ef826dd05e2b640dd799c6381c1606df996da5f4e8a0c66f785eacc558a8.zip
SHA256 5cb17f38814b487c149eb85a8c5c93af3ffef69fa1dedf48b5df229ce5dd4c53
Tags
fickerstealer infostealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5cb17f38814b487c149eb85a8c5c93af3ffef69fa1dedf48b5df229ce5dd4c53

Threat Level: Known bad

The file ca47ef826dd05e2b640dd799c6381c1606df996da5f4e8a0c66f785eacc558a8.zip was found to be: Known bad.

Malicious Activity Summary

fickerstealer infostealer

Fickerstealer family

Fickerstealer

Looks up external IP address via web service

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2023-03-21 13:28

Signatures

Fickerstealer family

fickerstealer

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-21 13:28

Reported

2023-03-21 13:31

Platform

win7-20230220-en

Max time kernel

146s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ca47ef826dd05e2b640dd799c6381c1606df996da5f4e8a0c66f785eacc558a8.exe"

Signatures

Fickerstealer

infostealer fickerstealer

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ca47ef826dd05e2b640dd799c6381c1606df996da5f4e8a0c66f785eacc558a8.exe

"C:\Users\Admin\AppData\Local\Temp\ca47ef826dd05e2b640dd799c6381c1606df996da5f4e8a0c66f785eacc558a8.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp
US 64.185.227.155:80 api.ipify.org tcp
US 8.8.8.8:53 blogsme.link udp

Files

C:\ProgramData\fasfvv.txt

MD5 71d587e911373f62d72a158eceb6e0e7
SHA1 68d81a1a4fb19c609288a94f10d1bbb92d972a68
SHA256 acce61361a3dee677653fa2909f29530202335835c71031ba4dff50682ae5de8
SHA512 a0010c487c8b1eeae82ae82896bf5f48b7ec5573197bbe149b6803093a32b3b470ef0b122278e404cd5df296376bb0629438609997d52c14757ff1c3e6756060

memory/1992-59-0x0000000000400000-0x0000000000468000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-03-21 13:28

Reported

2023-03-21 13:31

Platform

win10v2004-20230220-en

Max time kernel

150s

Max time network

157s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ca47ef826dd05e2b640dd799c6381c1606df996da5f4e8a0c66f785eacc558a8.exe"

Signatures

Fickerstealer

infostealer fickerstealer

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ca47ef826dd05e2b640dd799c6381c1606df996da5f4e8a0c66f785eacc558a8.exe

"C:\Users\Admin\AppData\Local\Temp\ca47ef826dd05e2b640dd799c6381c1606df996da5f4e8a0c66f785eacc558a8.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp
US 104.237.62.211:80 api.ipify.org tcp
NL 8.238.20.126:80 tcp
NL 8.238.177.126:80 tcp
US 8.8.8.8:53 211.62.237.104.in-addr.arpa udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 76.38.195.152.in-addr.arpa udp
US 52.109.8.45:443 tcp
US 8.8.8.8:53 216.74.101.95.in-addr.arpa udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 37.146.190.20.in-addr.arpa udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 202.74.101.95.in-addr.arpa udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 blogsme.link udp
US 13.89.179.9:443 tcp
US 8.8.8.8:53 blogsme.link udp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 55.154.139.52.in-addr.arpa udp
US 8.8.8.8:53 blogsme.link udp
NL 173.223.113.164:443 tcp
NL 173.223.113.131:80 tcp
US 204.79.197.203:80 tcp
US 8.8.8.8:53 blogsme.link udp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 62.13.109.52.in-addr.arpa udp
US 8.8.8.8:53 blogsme.link udp
NL 8.238.177.126:80 tcp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
NL 8.238.177.126:80 tcp
US 8.8.8.8:53 blogsme.link udp
US 52.152.110.14:443 tcp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp
US 8.8.8.8:53 blogsme.link udp

Files

C:\ProgramData\fasfvv.txt

MD5 0146b97f1bf748301734071d33706ba1
SHA1 4fe8ed756a2e7d09499d962cb3ffd9a7d3e20495
SHA256 c3af235b5b9c8f8c0657cab7c8c85f85d97100c7d13cb4fb6626c667e06b697f
SHA512 34e2df58d22ddbc3b5d4355394232e71b8ec68c389d2a21d99981200ba80e3f90e4af3c56aef2d50b5042796d658e6ac9007450d4e32f0d8db43d167a59f0cfb

memory/2080-138-0x0000000000400000-0x0000000000468000-memory.dmp