General

  • Target

    mixtwo_20210917-141359

  • Size

    484KB

  • Sample

    210926-nxkanaegc8

  • MD5

    51a63646e7e8969ecbe95217f745b392

  • SHA1

    044ea8ca6644a8c6eb095101b3d4e97b74409a58

  • SHA256

    6b65f3fdb04176615b3016d1578265bf54ed01f026917ce0e556a95f5b32f061

  • SHA512

    87efabc5b5a27631ee457211709ee71b9d8ff06242234676cff0a0cf6a430cc56028f3ea5d47de6c4313669e6ddb3cd12df0e9789e1c47b40451cf11387ee57c

Malware Config

Extracted

Family

fickerstealer

C2

game2030.site:80

Targets

    • Target

      mixtwo_20210917-141359

    • Size

      484KB

    • MD5

      51a63646e7e8969ecbe95217f745b392

    • SHA1

      044ea8ca6644a8c6eb095101b3d4e97b74409a58

    • SHA256

      6b65f3fdb04176615b3016d1578265bf54ed01f026917ce0e556a95f5b32f061

    • SHA512

      87efabc5b5a27631ee457211709ee71b9d8ff06242234676cff0a0cf6a430cc56028f3ea5d47de6c4313669e6ddb3cd12df0e9789e1c47b40451cf11387ee57c

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks