MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1a1d8823b35b8c0d8dfcebe065520a07fe105589893262976fce4122317c55b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



FickerStealer


Vendor detections: 8


Intelligence 8 IOCs 2 YARA 8 File information Comments

SHA256 hash: 1a1d8823b35b8c0d8dfcebe065520a07fe105589893262976fce4122317c55b8
SHA3-384 hash: 58813c536d3758f4a4c5d789860338d43b627a7a1f34c883562eeadbeb4ac8b6f3dbd52f9e40342f63404357888a3cce
SHA1 hash: 37175e6aa423c244e6354d7c971c512c0f2815d0
MD5 hash: ff6066894b993a333a798d53d427d468
humanhash: sierra-equal-london-illinois
File name:FF6066894B993A333A798D53D427D468.exe
Download: download sample
Signature FickerStealer
File size:792'064 bytes
First seen:2021-07-02 10:01:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9b239827ad94cf9e43aed2c8aec6e783 (3 x CryptBot, 2 x PrivateLoader, 1 x FickerStealer)
ssdeep 24576:uuqjXxOa5kaA9Wip4fdRHTuEa3kugTwy0K3q:zQxRG6E49TH0Sq
TLSH 2AF48E10B793E071D8A204F559BDBE6A543C7D1407389FEBA3D83E2C49791C25A32E9B
Reporter abuse_ch
Tags:exe FickerStealer


Avatar
abuse_ch
FickerStealer C2:
45.144.29.182:19066

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.144.29.182:19066 https://threatfox.abuse.ch/ioc/157136/
http://moraid05.top/index.php https://threatfox.abuse.ch/ioc/157139/

Intelligence


File Origin
# of uploads :
1
# of downloads :
153
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://topkeygen.com
Verdict:
Malicious activity
Analysis date:
2021-06-29 19:45:00 UTC
Tags:
autoit loader evasion trojan rat redline stealer vidar phishing ficker

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Vidar Glupteba RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Detected Info Stealer Vidar
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Drops PE files with benign system names
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May modify the system service descriptor table (often done to hook functions)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Glupteba
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 443418 Sample: RSsjWg9VFD.exe Startdate: 02/07/2021 Architecture: WINDOWS Score: 100 144 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->144 146 Found malware configuration 2->146 148 Antivirus detection for URL or domain 2->148 150 18 other signatures 2->150 9 RSsjWg9VFD.exe 4 43 2->9         started        process3 dnsIp4 132 2.56.59.61, 49749, 80 GBTCLOUDUS Netherlands 9->132 134 flamkravmaga.com 9->134 136 10 other IPs or domains 9->136 84 C:\Users\...\vFkC8iTD_KLGsFWak8o3qceO.exe, PE32 9->84 dropped 86 C:\Users\...\v7OUyKrk3kBNmSIWc0DvxMLy.exe, PE32 9->86 dropped 88 C:\Users\...\skuQ02ZVHniq6hwnXZj_rUAM.exe, PE32 9->88 dropped 90 21 other files (11 malicious) 9->90 dropped 178 Drops PE files to the document folder of the user 9->178 180 Disable Windows Defender real time protection (registry) 9->180 14 lWjY1SB7alQFDeccvCCyYE4r.exe 5 9->14         started        17 U0mtbMXF4UGlD9Xrg8ecS9qN.exe 9->17         started        21 vFkC8iTD_KLGsFWak8o3qceO.exe 9->21         started        23 9 other processes 9->23 file5 signatures6 process7 dnsIp8 92 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 14->92 dropped 25 rundll32.exe 14->25         started        28 conhost.exe 14->28         started        94 C:\ProgramData\...\screenshot.jpg, JPEG 17->94 dropped 104 8 other files (1 malicious) 17->104 dropped 152 Detected unpacking (changes PE section rights) 17->152 154 Detected Info Stealer Vidar 17->154 156 Detected unpacking (overwrites its own PE header) 17->156 164 2 other signatures 17->164 30 cmd.exe 17->30         started        96 C:\Program Files (x86)\...\md8_8eus.exe, PE32 21->96 dropped 98 C:\Program Files (x86)\Company\...\jooyu.exe, PE32 21->98 dropped 100 C:\Program Files (x86)\...\jingzhang.exe, PE32 21->100 dropped 106 2 other files (1 malicious) 21->106 dropped 32 jooyu.exe 21->32         started        36 jingzhang.exe 21->36         started        42 2 other processes 21->42 124 159.65.63.164 DIGITALOCEAN-ASNUS United States 23->124 126 47.243.129.23 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC United States 23->126 128 2 other IPs or domains 23->128 102 C:\Users\user\AppData\Local\BingoSearch.dll, PE32+ 23->102 dropped 108 11 other files (1 malicious) 23->108 dropped 158 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 23->158 160 Query firmware table information (likely to detect VMs) 23->160 162 Tries to detect sandboxes and other dynamic analysis tools (window names) 23->162 166 7 other signatures 23->166 38 ipPY6jsqpKLg5MChfEiXQXW7.exe 23->38         started        40 chrome.exe 23->40         started        44 5 other processes 23->44 file9 signatures10 process11 dnsIp12 170 Writes to foreign memory regions 25->170 172 Allocates memory in foreign processes 25->172 174 Creates a thread in another existing process (thread injection) 25->174 46 svchost.exe 25->46 injected 49 conhost.exe 30->49         started        110 ip-api.com 208.95.112.1 TUT-ASUS United States 32->110 112 star-mini.c10r.facebook.com 157.240.17.35 FACEBOOKUS United States 32->112 120 3 other IPs or domains 32->120 70 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 32->70 dropped 51 jfiag3g_gg.exe 32->51         started        53 jfiag3g_gg.exe 32->53         started        55 jfiag3g_gg.exe 32->55         started        72 C:\Users\user\AppData\Local\...\install.dll, PE32 36->72 dropped 74 C:\Users\user\AppData\...74ewtonsoft.Json.dll, PE32 36->74 dropped 57 rundll32.exe 36->57         started        59 conhost.exe 36->59         started        114 104.21.93.73 CLOUDFLARENETUS United States 38->114 76 C:\Windows\rss\csrss.exe, PE32 38->76 dropped 176 Creates an autostart registry key pointing to binary in C:\Windows 38->176 122 3 other IPs or domains 40->122 78 C:\Users\user\AppData\Local\...\History, SQLite 40->78 dropped 61 chrome.exe 40->61         started        116 101.36.107.74 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 42->116 118 iplogger.org 88.99.66.31 HETZNER-ASDE Germany 42->118 80 C:\Users\user\Documents\...\md8_8eus.exe, PE32 42->80 dropped 82 C:\Program Files (x86)\Company\...\d.jfm, DOS 42->82 dropped 64 2 other processes 44->64 file13 signatures14 process15 dnsIp16 182 System process connects to network (likely due to code injection or exploit) 46->182 184 Sets debug register (to hijack the execution of another thread) 46->184 186 Modifies the context of a thread in another process (thread injection) 46->186 66 svchost.exe 46->66         started        188 Tries to harvest and steal browser information (history, passwords, etc) 51->188 190 Creates a thread in another existing process (thread injection) 57->190 138 googlehosted.l.googleusercontent.com 142.250.180.193 GOOGLEUS United States 61->138 140 a.nel.cloudflare.com 35.190.80.1 GOOGLEUS United States 61->140 142 4 other IPs or domains 61->142 signatures17 process18 dnsIp19 130 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 66->130 168 Query firmware table information (likely to detect VMs) 66->168 signatures20
Threat name:
Win32.Infostealer.Passteal
Status:
Malicious
First seen:
2021-06-29 21:38:37 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:cryptbot family:fickerstealer family:glupteba family:metasploit family:plugx family:redline family:vidar botnet:02_07_r botnet:proliv_02.06.2021 botnet:shakal_team backdoor discovery dropper evasion infostealer loader spyware stealer themida trojan upx vmprotect
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Download via BitsAdmin
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks for any installed AV software in registry
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads local data of messenger clients
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
CryptBot
CryptBot Payload
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
PlugX
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
fickerstealer
Malware Config
C2 Extraction:
45.144.29.182:19066
rdanoriran.xyz:80
game2030.site:80
xeieib52.top
moraid05.top
enatuykebe.xyz:80
Unpacked files
SH256 hash:
1a1d8823b35b8c0d8dfcebe065520a07fe105589893262976fce4122317c55b8
MD5 hash:
ff6066894b993a333a798d53d427d468
SHA1 hash:
37175e6aa423c244e6354d7c971c512c0f2815d0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:Telegram_stealer_bin_mem
Author:James_inthe_box
Description:Telegram in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments