General

  • Target

    ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83

  • Size

    340KB

  • Sample

    220630-3qzjbscgaq

  • MD5

    0dcade2bc331eb3869f54a83761556d0

  • SHA1

    1561f63a0120654836a13054b994d9663e3de675

  • SHA256

    ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83

  • SHA512

    74e54b8c6d941f32b1fa5681bec2be736028b80e504c822238a827592e5c279855f5691f9ab31bb07107e1f72a6d41914a265b71275b4b686d9819df4478caf4

Malware Config

Extracted

Family

fickerstealer

C2

93.114.128.19:80

Targets

    • Target

      ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83

    • Size

      340KB

    • MD5

      0dcade2bc331eb3869f54a83761556d0

    • SHA1

      1561f63a0120654836a13054b994d9663e3de675

    • SHA256

      ae6fccbf7bb8d65103f9b9803a85ba08ba530e71d75bb74faf81814c37f72a83

    • SHA512

      74e54b8c6d941f32b1fa5681bec2be736028b80e504c822238a827592e5c279855f5691f9ab31bb07107e1f72a6d41914a265b71275b4b686d9819df4478caf4

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks