MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
FickerStealer
Vendor detections: 11
| SHA256 hash: | bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee |
|---|---|
| SHA3-384 hash: | 2da8e636303d974a84a49879fe6907096ad9371bd0ec2c9c616cfdb7af9f289c5109a24bbaf4e4efc75aba86d6ca3c7d |
| SHA1 hash: | a8a2d779abb35bf23ba21575af1e95a2ecd17265 |
| MD5 hash: | 04befedbe76440e1e24e59ff4244ce6a |
| humanhash: | twelve-montana-table-black |
| File name: | bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee |
| Download: | download sample |
| Signature | FickerStealer |
| File size: | 9'328'504 bytes |
| First seen: | 2021-08-19 13:27:54 UTC |
| Last seen: | 2021-11-25 12:33:53 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b90dd62ecc2a1bd703e267bb07d95990 (1 x FickerStealer, 1 x CryptBot, 1 x Amadey) |
| ssdeep | 196608:YwX6s+9/A4IlpYpvG2OF+n4XRg2SS20yfdVJMjOK:YwX6s+9boYAhbgAy1vMKK |
| Threatray | 4 similar samples on MalwareBazaar |
| TLSH | T14C96F163B389603EC46B19364A2BD7509D3FBF617902DC4B6BF4684C9F355406B3AA0B |
| dhash icon | f8f89c969392ece4 (3 x RedLineStealer, 2 x Formbook, 1 x FickerStealer) |
| Reporter | |
| Tags: | DMR Consulting Ltd. exe FickerStealer signed |
Code Signing Certificate
| Organisation: | DMR Consulting Ltd. |
|---|---|
| Issuer: | DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 |
| Algorithm: | sha256WithRSAEncryption |
| Valid from: | 2021-07-24T00:00:00Z |
| Valid to: | 2022-07-22T23:59:59Z |
| Serial number: | 01106cc293772ca905a2b6eff02bf0f5 |
| Intelligence: | 4 malware samples on MalwareBazaar are signed with this code signing certificate |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | cabbc7016d74f2f284520f91eeccd159a71f3edb0aecc34a09acad2042bf9c26 |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 45.142.212.149:80 | https://threatfox.abuse.ch/ioc/192321/ |
Intelligence
File Origin
# of uploads :
3
# of downloads :
166
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee
Verdict:
Malicious activity
Analysis date:
2021-08-19 13:34:34 UTC
Tags:
installer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Ficker
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
DNS request
Connection attempt
Sending an HTTP GET request
Creating a file
Sending a custom TCP request
Reading critical registry keys
Stealing user critical data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
FickerStealer
Verdict:
Malicious
Result
Threat name:
Ficker Stealer
Detection:
malicious
Classification:
phis.troj.spyw
Score:
48 / 100
Signature
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Yara detected Ficker Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.GenCBL
Status:
Malicious
First seen:
2021-08-19 01:26:00 UTC
File Type:
PE (Exe)
Extracted files:
451
AV detection:
12 of 28 (42.86%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Looks up external IP address via web service
Loads dropped DLL
Reads local data of messenger clients
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
29ae629e22eb3ed9488f4c066391be804aa547bf8c2aec26abf4252ee717c81c
MD5 hash:
d55f5db805502daffd553eeb5b687ccb
SHA1 hash:
e89c239a0db29ac50263c33764e132f7cf675a21
Detections:
win_fickerstealer_w0
SH256 hash:
1131d54fbc3bf68342cfec2203a8d5c09035d8d42bdcd9ff9a77f05ce359f6bb
MD5 hash:
6275a53218fc3677c18394e103b260c6
SHA1 hash:
563f94ee8726bca1a42aefeb1c8c4e9150356f56
SH256 hash:
bd8d1264a88d5cdd701a4ee909b70beaec39d216c988b33bfb30f25aee3540ee
MD5 hash:
04befedbe76440e1e24e59ff4244ce6a
SHA1 hash:
a8a2d779abb35bf23ba21575af1e95a2ecd17265
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.