General
-
Target
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8.zip
-
Size
370KB
-
Sample
230321-qq7hqacf7t
-
MD5
ead74e831165c63a7151c0f7622a681a
-
SHA1
4853cb05a88199449ff984d023e6a9717374c422
-
SHA256
4540480117da80ab268159e5ac07dae1e06818b5a17ee2adc7dfe83abec96ef1
-
SHA512
488f320330a47c7c0ee65ab3c53d8688d15491c8a4fec071e99933eb2dc008d9a4838721dc8f8f6aa2bf6129fcfeb39b8a4d3bec1d58ddb8ca11f83dd5288fd5
-
SSDEEP
6144:cDeK/Uz/a1leVfUV7UT3oAvLJ74Sgje6gNhAd+rICs8uWwB8yaQWeNeaL+GPThlC:AeLbaveVM9UTYUOSN6p9owB8yGeQWlSZ
Static task
static1
Behavioral task
behavioral1
Sample
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
fickerstealer
wejqwed.link:8080
Targets
-
-
Target
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8.exe
-
Size
484KB
-
MD5
858df84cee719d555d9c0e734e85e134
-
SHA1
5f041464895c49dc9fe0c3e156f0fb0511e6ad77
-
SHA256
fb623f4ae4dcaa007cac4365aa3ce13526ae32b94f2d9bfe5bf5b6f6a0e376b8
-
SHA512
4558fa0d39c7a88b9a92bc67256e67507d2b9602512e83dd4bba1209d08ea42b683d5ce1684a90576769db39d923aa0ca0f3deed5d3743fa92b45c0bb588a88b
-
SSDEEP
6144:cLD0cELbVdOkFuWupKYAbRjXXRQGOQ1k5W/HJXAiTACzKIugCoZsBf7jO5+:cn0b/VdJgKflXXRX/JQiTpnug6OQ
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-