General

  • Target

    mixsix_20211018-121016

  • Size

    556KB

  • Sample

    211019-l1wfzsgeen

  • MD5

    0e7d5f23ce2fdc3320d257a952444609

  • SHA1

    2b421eb8c9e27b5bdd113d1f45054d8eafa48726

  • SHA256

    6fc629fbf3a2155e080a6c65fde3db4fe84c3e818c20a3b4b9fb39242cbb2361

  • SHA512

    33b168293d0e192df369d7d4afff1915038179803782c4225a5cd6fcb26405eceba7c93045d27acbecbc4f6d9af0cc415a460988d95f207f7379c043e7495332

Malware Config

Extracted

Family

fickerstealer

C2

game2030.site:80

Extracted

Family

arkei

Botnet

Default

C2

http://gurums.online/ggate.php

Targets

    • Target

      mixsix_20211018-121016

    • Size

      556KB

    • MD5

      0e7d5f23ce2fdc3320d257a952444609

    • SHA1

      2b421eb8c9e27b5bdd113d1f45054d8eafa48726

    • SHA256

      6fc629fbf3a2155e080a6c65fde3db4fe84c3e818c20a3b4b9fb39242cbb2361

    • SHA512

      33b168293d0e192df369d7d4afff1915038179803782c4225a5cd6fcb26405eceba7c93045d27acbecbc4f6d9af0cc415a460988d95f207f7379c043e7495332

    • Arkei

      Arkei is an infostealer written in C++.

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • suricata: ET MALWARE Win32/Ficker Stealer Activity M3

      suricata: ET MALWARE Win32/Ficker Stealer Activity M3

    • Arkei Stealer Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks