General
-
Target
7478ca1f8d3491501541f9c274bc33ba
-
Size
513KB
-
Sample
240125-mm6v8sdhh8
-
MD5
7478ca1f8d3491501541f9c274bc33ba
-
SHA1
dbcc21741c53b829a8afdf51ceb84ab8b0a382e6
-
SHA256
70f7f831cf66d4871ea77ac0c19ccac7b2a4da2ce17c47853afaed30db55f9f2
-
SHA512
3373891f858e513f5ae1405b9d29821cf7ed73d2cbea17af229d01c4cb2ee0761e1c5ec10661ed849ffd8cd5136547b266d6a55ce14f4b046d682784571ebec6
-
SSDEEP
12288:WCNMuz3vIg5hbWnhvdRYOFc46OTExfZtpddlMW0rwrsu:W7uz3vIg5hbWJdbTTEp/p7lh3
Static task
static1
Behavioral task
behavioral1
Sample
7478ca1f8d3491501541f9c274bc33ba.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7478ca1f8d3491501541f9c274bc33ba.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
fickerstealer
80.87.192.115:80
Targets
-
-
Target
7478ca1f8d3491501541f9c274bc33ba
-
Size
513KB
-
MD5
7478ca1f8d3491501541f9c274bc33ba
-
SHA1
dbcc21741c53b829a8afdf51ceb84ab8b0a382e6
-
SHA256
70f7f831cf66d4871ea77ac0c19ccac7b2a4da2ce17c47853afaed30db55f9f2
-
SHA512
3373891f858e513f5ae1405b9d29821cf7ed73d2cbea17af229d01c4cb2ee0761e1c5ec10661ed849ffd8cd5136547b266d6a55ce14f4b046d682784571ebec6
-
SSDEEP
12288:WCNMuz3vIg5hbWnhvdRYOFc46OTExfZtpddlMW0rwrsu:W7uz3vIg5hbWJdbTTEp/p7lh3
Score10/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-