General
-
Target
96e013855d1c673cd9c3a756c455881122d9ec5930131956b1a807189a9a991d(phishing).zip
-
Size
219KB
-
Sample
230323-qcn48afh37
-
MD5
cf9988be8d226f346241a6b796d24c74
-
SHA1
fedebf0aaf742dd432c1280073b1efd2b0bfd9c4
-
SHA256
40c725d51c59b67db1bc5958c7a2f9ceffa3e277367133496fb2a8a919ebd5bf
-
SHA512
4da445c4b38e796bd2932c07e12c77cd0e7f9ed943ad541ab5adda6a9441f1c5ec3aa44e61e721dbe9b5d9a79a4d83b2a2d2ba89537a88930a1d64cc6b822201
-
SSDEEP
6144:m0P1aSHBwPuzBs4ExAqxUdFCmmN3QA65W:hFHBwGsLYjGQA2W
Static task
static1
Behavioral task
behavioral1
Sample
96e013855d1c673cd9c3a756c455881122d9ec5930131956b1a807189a9a991d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
96e013855d1c673cd9c3a756c455881122d9ec5930131956b1a807189a9a991d.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
fickerstealer
lukkeze.club:80
Targets
-
-
Target
96e013855d1c673cd9c3a756c455881122d9ec5930131956b1a807189a9a991d.exe
-
Size
282KB
-
MD5
72dcda0a0601b6e7df5b2d4133d8224f
-
SHA1
4604ae50310f18648bfdce614f6332088cddff63
-
SHA256
96e013855d1c673cd9c3a756c455881122d9ec5930131956b1a807189a9a991d
-
SHA512
d7e08462a7e6e27d707becc83825ec3ec9275cc36b60e85c4980d8ea5002d3a7973cb89ae993b657e38be502db206a0b27fa0cfd784505c0fba0f2b1edfc92a4
-
SSDEEP
6144:K8it3a+Prec1DJGDBXgN61cZlCsIH37fv1u5Jj6mV6:KJ3ofFXgcWWsIH37fya
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-