Over the last week (26th of July 2021), CERT-AGID observed a malspam campaign whose intent was to spread the FickerStealer malware via the Hancitor loader to steal the credentials present on the victim’s machine. The emails, themed “Pagamenti“, contained an attached Word or Excel document, within which macros were recorded for downloading and executing the malware.
Hancitor is a loader, that is, malware whose task is to download (or extract) and execute a second malware to control the machine. In the case of Hancitor, several research teams have identified FickerStealer, Sendsafe, and Cobalt Strike Beacons as payloads.
The malware is detected in the form of Word documents or Excel spreadsheets containing a DLL file and the macros necessary for its extraction and execution via the Microsoft RunDll32.exe program.
FickerStealer is a Malware-as-a-Service (MaaS). This type of malware is offered to criminal groups affiliated with the developers’ group and requires the payment of an access fee for the (time-limited) use of the malware.
In the case of FickerStealer, the product was advertised on Russian forums in the second half of 2020 and channels dedicated to supporting its use on Telegram were opened. Specifically, as observed by CERT-AGID, prices vary from $90 for a week up to $900 for six months of activity.
The malware is part of the Info-Stealer family and was designed to steal credentials and sensitive data present in the operating system, installed browsers and other software such as WinSCP, FileZilla, Steam, Discord and ThunderBird.
In addition, FickerStealer enumerates the crypto-wallets present in the system’s C:\Users\<UserName>\AppData\Roaming folder and does not run if the system language is one of the following:
- ru-RU (Russia)
- be-BY (Bielorussia)
- uz-UZ (Uzbekistan)
- ua-UA (Ucraina)
- hy-AM (Armenia)
- kk-KZ (Kazakistan)
- az-AZ (Azerbaigian)
|File Size||249856 bytes|
Di seguito vengono elencati gli Indicatori di Compromissione messi a disposizione dal CERT-AGID.