General
-
Target
44f6fd295d232c354eeee0a9400a22cc
-
Size
502KB
-
Sample
240106-b6eejsfef7
-
MD5
44f6fd295d232c354eeee0a9400a22cc
-
SHA1
ece682d49c4de44a8dc1204c0c3ab2f5a6794e1b
-
SHA256
74bbfe020e97e8756c092e2e9787c526e5a8e3d0c2c8ccbf80e10b1016ed3bc6
-
SHA512
455e737d4826bccc056be8752a9b7d1ae38011169c9013d1fe30ccdcc051ef91f320215cc173929dc8821edce66e4a24b0797fbecc39b0ceec01ca87fb8fc408
-
SSDEEP
6144:vcJoBE5x4ZGTTaufCeWDJjaUukihaE7kEYIMMMW0rLAb56dpLN4XQKJrsu:UJoBE0OTaTsIExMW0rwrsu
Static task
static1
Behavioral task
behavioral1
Sample
44f6fd295d232c354eeee0a9400a22cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44f6fd295d232c354eeee0a9400a22cc.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
fickerstealer
80.87.192.115:80
Targets
-
-
Target
44f6fd295d232c354eeee0a9400a22cc
-
Size
502KB
-
MD5
44f6fd295d232c354eeee0a9400a22cc
-
SHA1
ece682d49c4de44a8dc1204c0c3ab2f5a6794e1b
-
SHA256
74bbfe020e97e8756c092e2e9787c526e5a8e3d0c2c8ccbf80e10b1016ed3bc6
-
SHA512
455e737d4826bccc056be8752a9b7d1ae38011169c9013d1fe30ccdcc051ef91f320215cc173929dc8821edce66e4a24b0797fbecc39b0ceec01ca87fb8fc408
-
SSDEEP
6144:vcJoBE5x4ZGTTaufCeWDJjaUukihaE7kEYIMMMW0rLAb56dpLN4XQKJrsu:UJoBE0OTaTsIExMW0rwrsu
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-