MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 08c672cbfc638f1cde4a502afb6b0b907b0a665a6b487a9552cbf48abcb516a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FickerStealer


Vendor detections: 9


Intelligence 9 IOCs 3 YARA 4 File information Comments

SHA256 hash: 08c672cbfc638f1cde4a502afb6b0b907b0a665a6b487a9552cbf48abcb516a1
SHA3-384 hash: 4343958a560ace3eb423d58b8172fe076f8d7dbb74dcc7d0efb672a66b919d69296f344f039bdfdb874ccdc15923b162
SHA1 hash: 23aae060b278385144806e0c371af6c69b8e0158
MD5 hash: 56fbb5d915ff47c20902b8927ba569a3
humanhash: lithium-uncle-maine-happy
File name:56FBB5D915FF47C20902B8927BA569A3.exe
Download: download sample
Signature FickerStealer
File size:3'935'012 bytes
First seen:2021-07-23 03:55:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:JMdlMnIffWtaW1gBLuoitV6HxvT5DsimPSveqa:JMdiIXYaWYktVexv1Dveqa
Threatray 213 similar samples on MalwareBazaar
TLSH T131063376A0306F57E621497A2F79322BAEFB3433B8884B74F654931F7DD6D005252398
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe FickerStealer


Avatar
abuse_ch
FickerStealer C2:
77.220.213.35:52349

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
77.220.213.35:52349 https://threatfox.abuse.ch/ioc/162067/
185.244.182.34:22602 https://threatfox.abuse.ch/ioc/162201/
178.20.42.11:80 https://threatfox.abuse.ch/ioc/162206/

Intelligence


File Origin
# of uploads :
1
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
56FBB5D915FF47C20902B8927BA569A3.exe
Verdict:
No threats detected
Analysis date:
2021-07-23 03:56:59 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Backstage Stealer Cookie Stealer RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Backstage Stealer
Yara detected Cookie Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 452935 Sample: x7mhUvAVzm.exe Startdate: 23/07/2021 Architecture: WINDOWS Score: 100 112 91.241.19.12 REDBYTES-ASRU Russian Federation 2->112 114 88.99.66.31 HETZNER-ASDE Germany 2->114 116 4 other IPs or domains 2->116 136 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->136 138 Multi AV Scanner detection for domain / URL 2->138 140 Antivirus detection for URL or domain 2->140 142 18 other signatures 2->142 12 x7mhUvAVzm.exe 10 2->12         started        15 rundll32.exe 2->15         started        signatures3 process4 file5 110 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->110 dropped 17 setup_installer.exe 16 12->17         started        20 rundll32.exe 15->20         started        process6 file7 68 C:\Users\user\AppData\...\setup_install.exe, PE32 17->68 dropped 70 C:\Users\user\AppData\Local\...\sonia_8.txt, PE32 17->70 dropped 72 C:\Users\user\AppData\Local\...\sonia_7.txt, PE32 17->72 dropped 74 11 other files (none is malicious) 17->74 dropped 23 setup_install.exe 1 17->23         started        144 Writes to foreign memory regions 20->144 146 Allocates memory in foreign processes 20->146 148 Creates a thread in another existing process (thread injection) 20->148 27 svchost.exe 20->27 injected signatures8 process9 dnsIp10 132 sokiran.xyz 104.21.19.133, 49682, 80 CLOUDFLARENETUS United States 23->132 134 127.0.0.1 unknown unknown 23->134 174 Detected unpacking (changes PE section rights) 23->174 176 Performs DNS queries to domains with low reputation 23->176 29 cmd.exe 23->29         started        31 cmd.exe 1 23->31         started        33 cmd.exe 1 23->33         started        35 6 other processes 23->35 178 System process connects to network (likely due to code injection or exploit) 27->178 180 Sets debug register (to hijack the execution of another thread) 27->180 182 Modifies the context of a thread in another process (thread injection) 27->182 signatures11 process12 process13 37 sonia_6.exe 29->37         started        42 sonia_2.exe 1 31->42         started        44 sonia_3.exe 86 33->44         started        46 sonia_7.exe 35->46         started        48 sonia_4.exe 14 5 35->48         started        50 sonia_1.exe 2 35->50         started        52 2 other processes 35->52 dnsIp14 118 37.0.11.41, 49687, 80 WKD-ASIE Netherlands 37->118 120 136.144.41.201, 49691, 49692, 80 WORLDSTREAMNL Netherlands 37->120 126 9 other IPs or domains 37->126 76 C:\Users\...\x1oRWO_TJ6FzJdcAUTUshn_4.exe, PE32 37->76 dropped 78 C:\Users\...\vL3zvfPznrtU0v1Y8GFLfKWC.exe, PE32 37->78 dropped 80 C:\Users\...\rIsRxUa4ilp1nuXu4rBD_f3L.exe, PE32 37->80 dropped 86 33 other files (26 malicious) 37->86 dropped 150 Drops PE files to the document folder of the user 37->150 152 May check the online IP address of the machine 37->152 154 Disable Windows Defender real time protection (registry) 37->154 82 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 42->82 dropped 156 DLL reload attack detected 42->156 158 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 42->158 160 Renames NTDLL to bypass HIPS 42->160 170 3 other signatures 42->170 54 explorer.exe 42->54 injected 128 2 other IPs or domains 44->128 88 12 other files (none is malicious) 44->88 dropped 162 Detected unpacking (changes PE section rights) 44->162 164 Detected unpacking (overwrites its own PE header) 44->164 166 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 44->166 172 2 other signatures 44->172 122 ip-api.com 208.95.112.1, 49686, 80 TUT-ASUS United States 46->122 130 3 other IPs or domains 46->130 90 2 other files (1 malicious) 46->90 dropped 56 jfiag3g_gg.exe 46->56         started        124 cdn.discordapp.com 162.159.129.233, 443, 49683, 49696 CLOUDFLARENETUS United States 48->124 84 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 48->84 dropped 59 LzmwAqmV.exe 48->59         started        168 Creates processes via WMI 50->168 62 sonia_1.exe 50->62         started        92 3 other files (none is malicious) 52->92 dropped 64 Chrome2.exe 52->64         started        file15 signatures16 process17 file18 184 Tries to harvest and steal browser information (history, passwords, etc) 56->184 94 C:\Users\user\AppData\...\askinstall54.exe, PE32 59->94 dropped 96 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 59->96 dropped 98 C:\Users\user\AppData\Local\Temp\pub1.exe, PE32 59->98 dropped 108 3 other files (none is malicious) 59->108 dropped 100 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 62->100 dropped 102 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 62->102 dropped 104 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 62->104 dropped 66 conhost.exe 62->66         started        106 C:\Users\user\AppData\Roaming\system64.exe, PE32+ 64->106 dropped signatures19 process20
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-07-20 03:43:02 UTC
AV detection:
27 of 46 (58.70%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:fickerstealer family:redline family:smokeloader family:socelars family:vidar botnet:933 botnet:ani botnet:build2 aspackv2 backdoor infostealer persistence stealer suricata themida trojan upx
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Vidar Stealer
Fickerstealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE Win32/Ficker Stealer Activity M3
Malware Config
C2 Extraction:
https://shpak125.tumblr.com/
45.142.213.135:30059
yoshelona.xyz:80
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
07f0bb02ae3cdcc6de42a9821d4df3b631eae163f0d9843442eee8c9e22ed494
MD5 hash:
90056bc4ab28d7dcbc0fed6fc52e6e99
SHA1 hash:
a88b38f226fd164bb265a9cc0f209b482e7a5d7f
SH256 hash:
5865a02b77ee9d29a659941e12e42ba5f33eb8171a9038d23d149ce1f5aa1aed
MD5 hash:
d878ef3a6e894b62852b50d48617fa04
SHA1 hash:
a8099d3e461f2fa783b3ae89adcaf5286fdb63d2
SH256 hash:
bfcaf18e807972745d8a5acceb4dc7fb7e1fff7c448e02d79883b37a604c84e4
MD5 hash:
eb9d77547ef2b7c45aef75ad74182529
SHA1 hash:
116e5dcc6417421aa69fbb6efe3e9740ad4e8d2b
SH256 hash:
039138ea94c46bda318ef8c75e19321719cc367c9af1601def691f068b23930b
MD5 hash:
6e0166ca23e41e26791ebd31bd1d908b
SHA1 hash:
de67b4036034ba805bab3fa2a1b80a45f5e77f43
SH256 hash:
6529c1eb48d6a4ffe24e91bb65cab349436408048d403edf9fcfa38ac617d38b
MD5 hash:
aebba1a56e0d716d2e4b6676888084c8
SHA1 hash:
fb0fc0de54c2f740deb8323272ff0180e4b89d99
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
273fb2e46f46a189e896064ce7213f2805dc0aff361eb997d59ccd903f1e9e8a
MD5 hash:
9f569d0eae949d683725de7bbe893eb8
SHA1 hash:
e4696b870a5a9d06585df259e8ee80f4b2364823
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
a9083c13dd04bf55cc8e29ab4fe8a0053edf3ffe9b1e5ec31db207a45a98aaaf
MD5 hash:
2eb68e495e4eb18c86a443b2754bbab2
SHA1 hash:
82a535e1277ea7a80b809cfeb97dcfb5a5d48a37
SH256 hash:
d22e667e3f813d044ab2f69ba255c01cc847e7104760bff7a404875bc3ba67df
MD5 hash:
c04d390489ac28e849ca9159224822af
SHA1 hash:
5b0c9e7b4a95d4729e62d106dbf89cb72919e64a
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
f5d5b68ad033335a06f341b7968209734cae7487ac80a3646843762bd1147e69
MD5 hash:
7c42c04a6e95c6b494018be20ef811dc
SHA1 hash:
126d1bce056ae6ba2cea63815f6465450a1a6339
SH256 hash:
8ed9f410b41e51f09304e5cdadc4d61f82562c9ee15be810e063f2f568812dd0
MD5 hash:
0c3f670f496ffcf516fe77d2a161a6ee
SHA1 hash:
0c59d3494b38d768fe120e0a4ca2a1dca7567e6e
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
840bc1e71db7de9ea5ffb721cbe131b25d59123db863c0123f91e2692295f4d3
MD5 hash:
2f9e075f9a596bc326e92c373323ffeb
SHA1 hash:
79074d920b796756c5f5ad91cb54fb7126afe505
SH256 hash:
08c672cbfc638f1cde4a502afb6b0b907b0a665a6b487a9552cbf48abcb516a1
MD5 hash:
56fbb5d915ff47c20902b8927ba569a3
SHA1 hash:
23aae060b278385144806e0c371af6c69b8e0158
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICOIUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments