So close to the end and a final wall presents itself in my analysis. It appears that the author of Ficker stealer was smart and made sure that the malware would only execute and perform its attack when connected to a real network. Since I have my VMs connected to an internal network that give…