MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 90929f4e6bd28d6a197fef323930502ac1a3dcc9de8d4dba02dc6702fd570e14. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Osiris


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: 90929f4e6bd28d6a197fef323930502ac1a3dcc9de8d4dba02dc6702fd570e14
SHA3-384 hash: 3b85382bd8118faa97eaf88b90c1479ed263264eef594d169c993f9249543a55f58a8fb51cfa8032e7d2a28effce421e
SHA1 hash: 7a7c24e9bde5666de8763232d9ffa012fe9d18cd
MD5 hash: 1c213dbc2e5f8646d4c30586b7bcb3d8
humanhash: mississippi-six-stairway-asparagus
File name:FickerStealer.exe
Download: download sample
Signature Osiris
File size:315'376 bytes
First seen:2021-01-28 10:47:41 UTC
Last seen:2021-01-28 13:00:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 87f0b27637a9fce86ca169d3e638af97 (1 x Osiris)
ssdeep 6144:I/8umi0LX2ZdgewCEwZnidwHWOoV/ZVjtz1tghqeit+rrItqOJ:08uALigewCdZi4ZK/bhz1tDes+4tR
TLSH 2D64E001BB83E033D19315B14949C7754E3AB8B16B7586C77BE01A3D9F603E28B7A74A
Reporter JAMESWT_WT
Tags:FickerStealer JAY DANCE STUDIO d.o.o. Osiris signed

Code Signing Certificate

Organisation:AAA Certificate Services
Issuer:AAA Certificate Services
Algorithm:sha1WithRSAEncryption
Valid from:Jan 1 00:00:00 2004 GMT
Valid to:Dec 31 23:59:59 2028 GMT
Serial number: 01
Intelligence: 370 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Central Blocklist:This certificate is on the Cert Central blocklist
Thumbprint Algorithm:SHA256
Thumbprint: D7A7A0FB5D7E2731D771E9484EBCDEF71D5F0C3E0A2948782BC83EE0EA699EF4
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
170
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FickerStealer.exe
Verdict:
Malicious activity
Analysis date:
2021-01-28 10:50:43 UTC
Tags:
evasion trojan ficker stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending an HTTP GET request
Creating a file
Sending a custom TCP request
Reading critical registry keys
Delayed reading of the file
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a UDP request
Setting a keyboard event handler
Deleting a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Setting browser functions hooks
Unauthorized injection to a recently created process
Stealing user critical data
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Unauthorized injection to a browser process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Ficker Stealer
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
May use the Tor software to hide its network traffic
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
Removes signatures from Windows Defender
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Uses known network protocols on non-standard ports
Yara detected Ficker Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 345421 Sample: FickerStealer.exe Startdate: 28/01/2021 Architecture: WINDOWS Score: 100 72 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->72 74 Multi AV Scanner detection for submitted file 2->74 76 Detected unpacking (changes PE section rights) 2->76 78 12 other signatures 2->78 9 FickerStealer.exe 2->9         started        12 bac58a5f.exe 2->12         started        14 wsuj.exe 2->14         started        process3 signatures4 90 Contains functionality to inject code into remote processes 9->90 92 Injects a PE file into a foreign processes 9->92 16 FickerStealer.exe 18 9->16         started        94 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 12->94 96 Hijacks the control flow in another process 12->96 98 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->98 21 bac58a5f.exe 12->21         started        23 wsuj.exe 14->23         started        process5 dnsIp6 54 mobilesuit.top 5.53.125.150, 49724, 49725, 80 SELECTELRU Russian Federation 16->54 56 elb097307-934924932.us-east-1.elb.amazonaws.com 54.225.242.59, 49723, 80 AMAZON-AESUS United States 16->56 58 3 other IPs or domains 16->58 48 C:\Users\user\AppData\...\1611863358905.exe, PE32 16->48 dropped 50 C:\Users\user\AppData\...\1611863358528.exe, PE32 16->50 dropped 80 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->80 82 Tries to steal Instant Messenger accounts or passwords 16->82 84 Tries to harvest and steal browser information (history, passwords, etc) 16->84 86 Tries to harvest and steal Bitcoin Wallet information 16->86 25 1611863358905.exe 1 16->25         started        28 1611863358528.exe 8 16->28         started        file7 signatures8 process9 signatures10 100 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 25->100 102 Hijacks the control flow in another process 25->102 104 Contains functionality to detect hardware virtualization (CPUID execution measurement) 25->104 110 3 other signatures 25->110 30 1611863358905.exe 2 1 25->30         started        106 Detected unpacking (changes PE section rights) 28->106 108 Machine Learning detection for dropped file 28->108 35 cmd.exe 1 28->35         started        process11 dnsIp12 60 45.141.156.169, 49773, 80 YURTEH-ASUA Germany 30->60 62 194.109.206.212, 80 XS4ALL-NLAmsterdamNL Netherlands 30->62 64 64 other IPs or domains 30->64 52 C:\Users\user\AppData\...behaviorgraphetX64BTIT.exe, PE32+ 30->52 dropped 66 Installs a global keyboard hook 30->66 37 GetX64BTIT.exe 1 30->37         started        68 Disables Windows Defender (via service or powershell) 35->68 70 Removes signatures from Windows Defender 35->70 40 powershell.exe 23 35->40         started        42 conhost.exe 35->42         started        44 MpCmdRun.exe 2 35->44         started        46 4 other processes 35->46 file13 signatures14 process15 signatures16 88 Multi AV Scanner detection for dropped file 37->88
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-01-28 06:00:02 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:osiris banker botnet discovery evasion ransomware spyware trojan
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
JavaScript code in executable
Looks up external IP address via web service
Uses Tor communications
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies Windows Firewall
Contains code to disable Windows Defender
Modifies Windows Defender Real-time Protection settings
Modifies security service
Osiris
Unpacked files
SH256 hash:
90929f4e6bd28d6a197fef323930502ac1a3dcc9de8d4dba02dc6702fd570e14
MD5 hash:
1c213dbc2e5f8646d4c30586b7bcb3d8
SHA1 hash:
7a7c24e9bde5666de8763232d9ffa012fe9d18cd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Kronos
Author:kevoreilly
Description:Kronos Payload
Rule name:win_kronos_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments