SYMBOLCOMMON_NAMEaka. SYNONYMS
win.fickerstealer (Back to overview)

Ficker Stealer


There is no description at this point.

References
2022-01-19BlackberryThe BlackBerry Research & Intelligence Team
@online{team:20220119:kraken:5b52d17, author = {The BlackBerry Research & Intelligence Team}, title = {{Kraken the Code on Prometheus}}, date = {2022-01-19}, organization = {Blackberry}, url = {https://blogs.blackberry.com/en/2022/01/kraken-the-code-on-prometheus}, language = {English}, urldate = {2022-05-25} } Kraken the Code on Prometheus
Prometheus Backdoor BlackMatter Cerber Cobalt Strike DCRat Ficker Stealer QakBot REvil Ryuk
2021-08-12BlackberryBlackBerry Research & Intelligence Team
@online{team:20210812:threat:254ba6c, author = {BlackBerry Research & Intelligence Team}, title = {{Threat Thursday: Ficker Infostealer Malware}}, date = {2021-08-12}, organization = {Blackberry}, url = {https://blogs.blackberry.com/en/2021/08/threat-thursday-ficker-infostealer-malware}, language = {English}, urldate = {2021-08-17} } Threat Thursday: Ficker Infostealer Malware
Ficker Stealer
2021-07-19CyberArkBen Cohen
@online{cohen:20210719:fickerstealer:6d57700, author = {Ben Cohen}, title = {{FickerStealer: A New Rust Player in the Market}}, date = {2021-07-19}, organization = {CyberArk}, url = {https://www.cyberark.com/resources/threat-research-blog/fickerstealer-a-new-rust-player-in-the-market}, language = {English}, urldate = {2021-07-26} } FickerStealer: A New Rust Player in the Market
Ficker Stealer
2021-06-17Binary DefenseBrandon George
@online{george:20210617:analysis:6e4b8ac, author = {Brandon George}, title = {{Analysis of Hancitor – When Boring Begets Beacon}}, date = {2021-06-17}, organization = {Binary Defense}, url = {https://www.binarydefense.com/analysis-of-hancitor-when-boring-begets-beacon}, language = {English}, urldate = {2021-06-22} } Analysis of Hancitor – When Boring Begets Beacon
Cobalt Strike Ficker Stealer Hancitor
2021-04-22SpamhausSpamhaus Malware Labs
@techreport{labs:20210422:spamhaus:4a32a4d, author = {Spamhaus Malware Labs}, title = {{Spamhaus Botnet Threat Update Q1 2021}}, date = {2021-04-22}, institution = {Spamhaus}, url = {https://www.spamhaus.com/custom-content/uploads/2021/04/Botnet-update-Q1-2021.pdf}, language = {English}, urldate = {2021-04-28} } Spamhaus Botnet Threat Update Q1 2021
Emotet Ficker Stealer Raccoon
2021-04-20Bleeping ComputerLawrence Abrams
@online{abrams:20210420:fake:fca82a4, author = {Lawrence Abrams}, title = {{Fake Microsoft Store, Spotify sites spread info-stealing malware}}, date = {2021-04-20}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/fake-microsoft-store-spotify-sites-spread-info-stealing-malware/}, language = {English}, urldate = {2021-06-16} } Fake Microsoft Store, Spotify sites spread info-stealing malware
Ficker Stealer
2021-03-17HPHP Bromium
@techreport{bromium:20210317:threat:3aed551, author = {HP Bromium}, title = {{Threat Insights Report Q4-2020}}, date = {2021-03-17}, institution = {HP}, url = {https://threatresearch.ext.hp.com/wp-content/uploads/2021/03/HP_Bromium_Threat_Insights_Report_Q4_2020.pdf}, language = {English}, urldate = {2021-03-19} } Threat Insights Report Q4-2020
Agent Tesla BitRAT ComodoSec Dridex Emotet Ficker Stealer Formbook Zloader
2021-01-18Medium csis-techblogBenoît Ancel
@online{ancel:20210118:gcleaner:f8b9064, author = {Benoît Ancel}, title = {{GCleaner — Garbage Provider Since 2019}}, date = {2021-01-18}, organization = {Medium csis-techblog}, url = {https://medium.com/csis-techblog/gcleaner-garbage-provider-since-2019-2708e7c87a8a}, language = {English}, urldate = {2021-01-21} } GCleaner — Garbage Provider Since 2019
Amadey Ficker Stealer Raccoon RedLine Stealer SmokeLoader STOP
2020-10-27Twitter (@3xp0rtblog)3xp0rt
@online{3xp0rt:20201027:ficker:b890340, author = {3xp0rt}, title = {{Tweet on Ficker Stealer}}, date = {2020-10-27}, organization = {Twitter (@3xp0rtblog)}, url = {https://twitter.com/3xp0rtblog/status/1321209656774135810}, language = {English}, urldate = {2021-12-17} } Tweet on Ficker Stealer
Ficker Stealer
Yara Rules
[TLP:WHITE] win_fickerstealer_auto (20220516 | Detects win.fickerstealer.)
rule win_fickerstealer_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-05-16"
        version = "1"
        description = "Detects win.fickerstealer."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.fickerstealer"
        malpedia_rule_date = "20220513"
        malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26"
        malpedia_version = "20220516"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8d4da4 f20f114b08 f20f1103 8d5de4 89da e8???????? f20f104750 }
            // n = 7, score = 200
            //   8d4da4               | lea                 ecx, [ebp - 0x5c]
            //   f20f114b08           | movsd               qword ptr [ebx + 8], xmm1
            //   f20f1103             | movsd               qword ptr [ebx], xmm0
            //   8d5de4               | lea                 ebx, [ebp - 0x1c]
            //   89da                 | mov                 edx, ebx
            //   e8????????           |                     
            //   f20f104750           | movsd               xmm0, qword ptr [edi + 0x50]

        $sequence_1 = { e8???????? 59 89f1 83fa04 0fc9 898dd4feffff 0f85f0250000 }
            // n = 7, score = 200
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   89f1                 | mov                 ecx, esi
            //   83fa04               | cmp                 edx, 4
            //   0fc9                 | bswap               ecx
            //   898dd4feffff         | mov                 dword ptr [ebp - 0x12c], ecx
            //   0f85f0250000         | jne                 0x25f6

        $sequence_2 = { f20f118c1198000000 f20f11841190000000 66894106 8b4c2414 8b5c2478 8b442418 f6d1 }
            // n = 7, score = 200
            //   f20f118c1198000000     | movsd    qword ptr [ecx + edx + 0x98], xmm1
            //   f20f11841190000000     | movsd    qword ptr [ecx + edx + 0x90], xmm0
            //   66894106             | mov                 word ptr [ecx + 6], ax
            //   8b4c2414             | mov                 ecx, dword ptr [esp + 0x14]
            //   8b5c2478             | mov                 ebx, dword ptr [esp + 0x78]
            //   8b442418             | mov                 eax, dword ptr [esp + 0x18]
            //   f6d1                 | not                 cl

        $sequence_3 = { e8???????? 59 5d c3 55 89e5 53 }
            // n = 7, score = 200
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   5d                   | pop                 ebp
            //   c3                   | ret                 
            //   55                   | push                ebp
            //   89e5                 | mov                 ebp, esp
            //   53                   | push                ebx

        $sequence_4 = { eb78 8d7c2410 89f9 e8???????? 8b5708 8b0f 89d3 }
            // n = 7, score = 200
            //   eb78                 | jmp                 0x7a
            //   8d7c2410             | lea                 edi, [esp + 0x10]
            //   89f9                 | mov                 ecx, edi
            //   e8????????           |                     
            //   8b5708               | mov                 edx, dword ptr [edi + 8]
            //   8b0f                 | mov                 ecx, dword ptr [edi]
            //   89d3                 | mov                 ebx, edx

        $sequence_5 = { 8d4ddc f20f1045a0 f20f104d98 f20f114208 f20f110a 50 e8???????? }
            // n = 7, score = 200
            //   8d4ddc               | lea                 ecx, [ebp - 0x24]
            //   f20f1045a0           | movsd               xmm0, qword ptr [ebp - 0x60]
            //   f20f104d98           | movsd               xmm1, qword ptr [ebp - 0x68]
            //   f20f114208           | movsd               qword ptr [edx + 8], xmm0
            //   f20f110a             | movsd               qword ptr [edx], xmm1
            //   50                   | push                eax
            //   e8????????           |                     

        $sequence_6 = { 8b8d60feffff 21c1 8b4584 898d24fdffff 8d8d54feffff 8985d4feffff 8b45bc }
            // n = 7, score = 200
            //   8b8d60feffff         | mov                 ecx, dword ptr [ebp - 0x1a0]
            //   21c1                 | and                 ecx, eax
            //   8b4584               | mov                 eax, dword ptr [ebp - 0x7c]
            //   898d24fdffff         | mov                 dword ptr [ebp - 0x2dc], ecx
            //   8d8d54feffff         | lea                 ecx, [ebp - 0x1ac]
            //   8985d4feffff         | mov                 dword ptr [ebp - 0x12c], eax
            //   8b45bc               | mov                 eax, dword ptr [ebp - 0x44]

        $sequence_7 = { b002 09f2 0f94c1 28c8 8d65f4 5e 5f }
            // n = 7, score = 200
            //   b002                 | mov                 al, 2
            //   09f2                 | or                  edx, esi
            //   0f94c1               | sete                cl
            //   28c8                 | sub                 al, cl
            //   8d65f4               | lea                 esp, [ebp - 0xc]
            //   5e                   | pop                 esi
            //   5f                   | pop                 edi

        $sequence_8 = { e8???????? 59 31c9 85c0 0f445508 0f94c1 0f45f8 }
            // n = 7, score = 200
            //   e8????????           |                     
            //   59                   | pop                 ecx
            //   31c9                 | xor                 ecx, ecx
            //   85c0                 | test                eax, eax
            //   0f445508             | cmove               edx, dword ptr [ebp + 8]
            //   0f94c1               | sete                cl
            //   0f45f8               | cmovne              edi, eax

        $sequence_9 = { c3 55 89e5 57 56 81ec80000000 8b750c }
            // n = 7, score = 200
            //   c3                   | ret                 
            //   55                   | push                ebp
            //   89e5                 | mov                 ebp, esp
            //   57                   | push                edi
            //   56                   | push                esi
            //   81ec80000000         | sub                 esp, 0x80
            //   8b750c               | mov                 esi, dword ptr [ebp + 0xc]

    condition:
        7 of them and filesize < 598016
}
[TLP:WHITE] win_fickerstealer_w0   (20210726 | Yara rule for Ficker Stealer)
rule win_fickerstealer_w0 {
  meta: 
    author = "Ben Cohen, CyberArk"
    date = "22-02-2021"
    version = "1.0"
    hash = "a4113ccb55e06e783b6cb213647614f039aa7dbb454baa338459ccf37897ebd6"
    source = "https://github.com/cyberark/malware-research/blob/master/FickerStealer/Ficker_Stealer.yar"
    description = "Yara rule for Ficker Stealer"
    malpedia_rule_date = "20210726"
    malpedia_hash = ""
    malpedia_version = "20210726"
    malpedia_license = "CC BY-NC-SA 4.0"
    malpedia_sharing = "TLP:WHITE"
    malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.fickerstealer"
  
  strings:
    //$decryption_pattern = { 89 ?? C1 ?? ?? 31 ?? 89 ?? C1 ?? ?? 31 ?? 8B ?? ?? 89 ?? C1 ?? ?? 31 }
    $c2_const = { 0C 00 0F 0A [0-4] 0B 0A 0B 0A }

    $s1 = "kindmessage"
    $s2 = "SomeNone"
    $s3 = ".Kind"

  condition:
    //$decryption_pattern and
    $c2_const and
    (1 of ($s*)) and
    uint16(0) == 0x5A4D
}
Download all Yara Rules