General

  • Target

    7144f017904a36ab19ebf81fe9bf035a.exe

  • Size

    408KB

  • Sample

    221024-qphg7sghhr

  • MD5

    7144f017904a36ab19ebf81fe9bf035a

  • SHA1

    752b66f7ef137e876e88bb369f369f77a19976d5

  • SHA256

    e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7

  • SHA512

    30e561e621afdb9fa9c73b590dd67e257966cba6b62b899102371fcae1db5a7cbfbed0cc8adee1657c937e3e0587406ab1fa976e603466211203b5fc9de3dfff

  • SSDEEP

    12288:yFzPPn2KVdfuXzqSNYOtDw/EaYv59F1o+:Szf2MSfNvtXPv5a+

Malware Config

Extracted

Family

fickerstealer

C2

kefkfkf.link:8080

Targets

    • Target

      7144f017904a36ab19ebf81fe9bf035a.exe

    • Size

      408KB

    • MD5

      7144f017904a36ab19ebf81fe9bf035a

    • SHA1

      752b66f7ef137e876e88bb369f369f77a19976d5

    • SHA256

      e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7

    • SHA512

      30e561e621afdb9fa9c73b590dd67e257966cba6b62b899102371fcae1db5a7cbfbed0cc8adee1657c937e3e0587406ab1fa976e603466211203b5fc9de3dfff

    • SSDEEP

      12288:yFzPPn2KVdfuXzqSNYOtDw/EaYv59F1o+:Szf2MSfNvtXPv5a+

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks