General

  • Target

    974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264

  • Size

    322KB

  • Sample

    220708-tq1a7abhh4

  • MD5

    82cd72fb70faf6f7e0e840e71988b053

  • SHA1

    d93913f7080e0603f058fabc76fb1f95da3ac1fe

  • SHA256

    974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264

  • SHA512

    acf512b9c5cfecf627491d56ae4ef7b2a358ce4a58e167efb1456e5390e78be44b1a72a17914dbc1625da1b57fac723ff7d700ccdfe07a00913b877f42352435

Malware Config

Extracted

Family

fickerstealer

C2

93.114.128.19:80

Targets

    • Target

      974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264

    • Size

      322KB

    • MD5

      82cd72fb70faf6f7e0e840e71988b053

    • SHA1

      d93913f7080e0603f058fabc76fb1f95da3ac1fe

    • SHA256

      974600d9e7e80bc810fd80afc72e1ab831aeb145a9f35e513e1cdf289ee48264

    • SHA512

      acf512b9c5cfecf627491d56ae4ef7b2a358ce4a58e167efb1456e5390e78be44b1a72a17914dbc1625da1b57fac723ff7d700ccdfe07a00913b877f42352435

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks