Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-03-2023 13:28
Behavioral task
behavioral1
Sample
58d1e777704216e668537c6db64d0178d44071736ed966eb3fc88bc05e6840c3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
58d1e777704216e668537c6db64d0178d44071736ed966eb3fc88bc05e6840c3.exe
Resource
win10v2004-20230220-en
General
-
Target
58d1e777704216e668537c6db64d0178d44071736ed966eb3fc88bc05e6840c3.exe
-
Size
391KB
-
MD5
42281d49da52812c4cd33228af087eaf
-
SHA1
7779d21fc9d1ea46dc643dfd45fa32ba4f54e6e2
-
SHA256
58d1e777704216e668537c6db64d0178d44071736ed966eb3fc88bc05e6840c3
-
SHA512
5bdc8c9f4056a8ba7fd6a03f438e871cec4ded79f1d8886e40b44904626de204341b50b76024309e6d4354fa62d20b2d3e9c0df398013bf20c2808f73c3b65e5
-
SSDEEP
6144:cW3mkqlxrNBKiU6893YBwq3xj4/XjT7d6srMQW+bXvd0GsuFC1OlbTVdWnKfX:Lmk8TZUloBPsPj4KN/d0ouN
Malware Config
Extracted
fickerstealer
blogsme.link:8080
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD571d587e911373f62d72a158eceb6e0e7
SHA168d81a1a4fb19c609288a94f10d1bbb92d972a68
SHA256acce61361a3dee677653fa2909f29530202335835c71031ba4dff50682ae5de8
SHA512a0010c487c8b1eeae82ae82896bf5f48b7ec5573197bbe149b6803093a32b3b470ef0b122278e404cd5df296376bb0629438609997d52c14757ff1c3e6756060