General
-
Target
ce9ef12f8e1127096913e2e05d725ccd
-
Size
474KB
-
Sample
231220-r9742aggam
-
MD5
ce9ef12f8e1127096913e2e05d725ccd
-
SHA1
516b2566652cf80ae90dd7c0be91546e8a228b6b
-
SHA256
94930231bb310c9e34f6072be7428c5a64e21af721356101fade2f01593288e4
-
SHA512
c57871af01c2f898e123dc04bf6405f0492fa2660bff41af5d6613b85eee0981e07623a53b4e20e864ef55030b117b2af64541618620f1075f6dc5112c3b7890
-
SSDEEP
6144:ZoXTT6WUEZkrK9C9dhMLa/dkIdFMzvppGmPMlnELWNMW0rLAb56dpLN4XQKJ3:ZwTT6WUEKK9C9UadhGvp4VnNMW0rw3
Static task
static1
Behavioral task
behavioral1
Sample
ce9ef12f8e1127096913e2e05d725ccd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ce9ef12f8e1127096913e2e05d725ccd.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
fickerstealer
game2030.site:80
Targets
-
-
Target
ce9ef12f8e1127096913e2e05d725ccd
-
Size
474KB
-
MD5
ce9ef12f8e1127096913e2e05d725ccd
-
SHA1
516b2566652cf80ae90dd7c0be91546e8a228b6b
-
SHA256
94930231bb310c9e34f6072be7428c5a64e21af721356101fade2f01593288e4
-
SHA512
c57871af01c2f898e123dc04bf6405f0492fa2660bff41af5d6613b85eee0981e07623a53b4e20e864ef55030b117b2af64541618620f1075f6dc5112c3b7890
-
SSDEEP
6144:ZoXTT6WUEZkrK9C9dhMLa/dkIdFMzvppGmPMlnELWNMW0rLAb56dpLN4XQKJ3:ZwTT6WUEKK9C9UadhGvp4VnNMW0rw3
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-