{"id":89844,"date":"2021-05-11T14:46:46","date_gmt":"2021-05-11T09:16:46","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89844"},"modified":"2023-08-08T17:43:33","modified_gmt":"2023-08-08T12:13:33","slug":"ficker-an-info-stealer-malware-that-tricks-people-to-get-their-passwords","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/ficker-an-info-stealer-malware-that-tricks-people-to-get-their-passwords\/","title":{"rendered":"Ficker \u2013 An Info-Stealer Malware that tricks people to get their passwords"},"content":{"rendered":"<p>Credential stealer malware is the most prevalent types of malware used in cyber-attacks. We have seen a lot of new stealer malware in the wild. The main objective of all credential stealer malware is to collect all confidential and sensitive information like user credentials and financial information.<\/p>\n<p>Ficker Stealer is a family of information-stealing malware that emerged in 2020. Its capabilities include stealing sensitive information such as passwords, web browser passwords, cryptocurrency wallets, FTP client information, credentials stored by Windows Credential Manager, and session information from various chat and email clients.<\/p>\n<p>Malware uses different techniques to get entry into a victim\u2019s computer, like malicious email attachments, malicious online advertisements, social engineering etc. The infection process starts when Illegal activation tools (&#8220;cracks&#8221;) can be downloaded\/installed instead of activating the licensed product. These <a href=\"https:\/\/blogs.quickheal.com\/5-ways-instantly-detect-phishing-email-save-phishing-attack\/\">phishing emails<\/a> or malicious document downloaded are having a file attachment that contains macros to run the malware in the system. Recently we have seen that Hancitor malware also deliver Ficker Stealer.<\/p>\n<p>At the time of analysis, the initial attack vector was unknown, but the attack chain was traced, through the malicious XLSM file that will be analyzed below. Quick Heal Security labs believe that the initial infection vector for this malware is an email with a malicious attachment.<\/p>\n<p><strong>XLSM File Analysis<\/strong><\/p>\n<p>The malicious document embedded with macro is not the usual VBA macro &#8211; it is XLS Macro. On clicking on Enable Editing, an embedded macro code will be activated, used by malware to download the malicious file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89845 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture1-552x390.jpg\" alt=\"\" width=\"552\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture1-552x390.jpg 552w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture1-300x212.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture1.jpg 769w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 1: Malicious document asks users to enable a macro.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>This malware uses OOXML format-based MS Excel file, which has the XLM macro sheets present in the \u201cmacro sheets\u201d folder. This malware uses different folder and file name to store macro sheet that is suspicious. The macro sheet name is &#8220;proton.bin\u201d as shown in the below image.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89846 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture2-638x390.jpg\" alt=\"\" width=\"638\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture2-638x390.jpg 638w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture2-300x183.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture2-768x469.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture2-789x482.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture2.jpg 879w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 2. Malicious file Proton.bin in xlsm<\/em><\/p>\n<p>Engines that checks for macro sheets, especially inside the \u201cmacro sheets\u201d folder may fail to identify these files as XLM based Macro files. We investigated very carefully inside the \u201cworkbook.xml.rels\u201d file and found the complete path of the file name &#8220;xl\\proton.bin&#8221; for the macro sheet.<\/p>\n<p>At the first look, workbook.xml.rels seems clean, and nothing related to malicious filename was found because malware authors have put its code in workbook.xml.rels at the end of the page and put blanks in between to evade the regular AV scans. By looking at the line number in the image below it can easily be understood.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89847 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture3-650x278.jpg\" alt=\"\" width=\"650\" height=\"278\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture3-650x278.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture3-300x128.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture3-768x328.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture3-789x337.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture3.jpg 1347w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 3. Evasion shows in File<\/em><\/p>\n<p>This sample contains one hidden macro sheet which enables macro execution as soon as the file is opened.\u00a0 The font size of the content is kept small so that it will not be easily readable.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89848 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture4-650x358.jpg\" alt=\"\" width=\"650\" height=\"358\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture4-650x358.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture4-300x165.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture4.jpg 757w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 4. Hidden Sheet in XLSM<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89849 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture5-392x390.jpg\" alt=\"\" width=\"392\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture5-392x390.jpg 392w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture5-150x150.jpg 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture5-70x70.jpg 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture5-80x81.jpg 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture5-45x45.jpg 45w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture5.jpg 606w\" sizes=\"(max-width: 392px) 100vw, 392px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 5. Hidden Sheet content<\/em><\/p>\n<p>The malware creates a folder &#8220;<strong>C:\\dswekerjs\\dljffsrd\\<\/strong>&#8220;, where it downloads the malicious file \u201cServApi.exe\u201d.<\/p>\n<p>Url used for downloading the payload is &#8220;<strong><em>http[:]\/\/www[.]rand934[.]xyz\/155.html<\/em><\/strong><em>&#8220;<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89850 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture6.jpg\" alt=\"\" width=\"296\" height=\"147\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 6. File downloaded by malware<\/em><\/p>\n<p><strong>Payload Analysis<\/strong><\/p>\n<p>During static analysis, we observed that the wrapper firstly calls &#8220;VirtualAlloc&#8221; to allocate memory so that it decrypts the actual payload in the memory. Malware uses two decryption loops as shown below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89851 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture7-398x390.jpg\" alt=\"\" width=\"398\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture7-398x390.jpg 398w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture7-300x294.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture7-70x70.jpg 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture7-45x45.jpg 45w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture7.jpg 400w\" sizes=\"(max-width: 398px) 100vw, 398px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 7. Decryption loop 1<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89852 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture8.jpg\" alt=\"\" width=\"494\" height=\"261\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture8.jpg 494w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture8-300x159.jpg 300w\" sizes=\"(max-width: 494px) 100vw, 494px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 8. Decryption Loop 2<\/em><\/p>\n<p>Malware decrypts the actual payload in memory which is kept obfuscated. It copies 0x158C bytes to a new location, which is kept at the lower part of decrypted buffer and then copies the remaining part of the new PE file in it.<\/p>\n<p>Now the decrypted payload is executed. Firstly, it checks for internet connection if an internet connection is not found then it calls the sleep() function in the loop. If an internet connection is found, then it continues the execution.<\/p>\n<p>Mutex created by the malware is &#8220;serhershesrhsfesrf&#8221;, mutex name is kept encrypted by the malware. The below image shows mutex created by malware:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89853 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture9-650x177.jpg\" alt=\"\" width=\"650\" height=\"177\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture9-650x177.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture9-300x82.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture9-304x84.jpg 304w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture9.jpg 749w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 9. Mutex created by malware<\/em><\/p>\n<p>The malware calls the function &#8220;GetUserDefaultLocaleName&#8221; which retrieves the locale name of the computer, and it will not execute if the following country codes are found:<\/p>\n<p><strong>ru-RU \u2013 Russia<\/strong><\/p>\n<p><strong>ua-UA &#8211; Ukraine<\/strong><\/p>\n<p><strong>kk-KZ &#8211; Kazakhstan<\/strong><\/p>\n<p><strong>uz-UZ &#8211; Uzbekistan<\/strong><\/p>\n<p><strong>hy-AM &#8211; Armenia<\/strong><\/p>\n<p><strong>be-BY &#8211; Belarus<\/strong><\/p>\n<p><strong>az-AZ \u2013 Azerbaijan<\/strong><\/p>\n<p>The malware calls the function &#8220;<em>URLDownloadToFile()<\/em>&#8221; and uses the URL &#8220;<em>http:\/\/api.ipify.org\/?format=xml<\/em>&#8221; to get the external IP address of the device. It downloads the information from the web service and saves it to the file <strong>C:\\ProgramData\\kaosdma.txt.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89854 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture10.jpg\" alt=\"\" width=\"358\" height=\"160\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture10.jpg 358w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Picture10-300x134.jpg 300w\" sizes=\"(max-width: 358px) 100vw, 358px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 10. File created by malware<\/em><\/p>\n<p>C2 used by the malware is &#8220;185.215.113.109:80&#8221;. C2 are the command centres from where malware receives its commands. They are also used to collect and store stolen data. Malware establishes a TCP connection using port 80. Malware uses the following sequence of APIs for communication.<\/p>\n<p>Getaddrinfo()-&gt;connect()-&gt;send()-&gt;recv()-&gt;closesocket()<\/p>\n<p>It enumerates running processes using Process32First() and process32Next(). It also collects information stored in files using FindFirstFileW() and FindNextFileW(). It collects all information in a buffer and then encrypt the buffer using simple XOR function and then send the data to the server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89855 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Picture11.jpg\" alt=\"\" width=\"262\" height=\"104\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 11.Loop for encryption<\/em><\/p>\n<p>It tries to steal <a href=\"https:\/\/blogs.quickheal.com\/blockchain-fraud-prevention-strategies-to-overcome-the-cryptocurrency-scam\/\">Crypto-Wallets<\/a>, harvest and steal Bitcoin Wallet information, try to harvest and steal Putty \/ WinSCP information (sessions, passwords, etc.), and harvest and steal browser information (history, passwords, etc.) and steal Instant Messenger accounts or passwords, etc.<\/p>\n<p>Stolen data can be used widely to gain unauthorized access to email accounts, bank accounts, and other online sources. This stolen personal information can harm the user mentally as well as financially. Ficker malware variants are successfully detected by <a href=\"https:\/\/www.quickheal.co.in\/home-users\/\">Quick Heal products<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Conclusion<\/strong><\/h5>\n<p>In the era of Ransomware, Infostealer malware is an equally popular attack vector used by attackers. We advise our users to avoid accessing suspicious websites\/emails and keep their antivirus software up-to-date to prevent their systems from being infected by such complex malware. <a href=\"https:\/\/www.quickheal.co.in\/\">Quick Heal<\/a> with its advanced detection technology, has been consistently monitoring &amp; blocking these complex malware and malicious sites.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>IOCs<\/strong><\/p>\n<p>8F442E8D149E52D4C038C377CEC1C32E (EXE)<\/p>\n<p>B2989544E53D3BA2E0A2DDED1BF16524 (DOC)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Credential stealer malware is the most prevalent types of malware used in cyber-attacks. We have seen a lot of new stealer malware in the wild. The main objective of all credential stealer malware is to collect all confidential and sensitive information like user credentials and financial information. Ficker Stealer is a family of information-stealing malware [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":89856,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1739,24],"tags":[534,1805,1806,49,72,1078,962],"class_list":["post-89844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-malware","tag-cybersecurity","tag-ficker","tag-fickerstealer","tag-malware","tag-microsoft","tag-password-security","tag-spotify"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89844"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89844"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89844\/revisions"}],"predecessor-version":[{"id":91478,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89844\/revisions\/91478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89856"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}