General

  • Target

    library_2.exe

  • Size

    508KB

  • Sample

    221111-g4b5asbgcj

  • MD5

    88367344c224ae3ed9030cfcb389184a

  • SHA1

    a9b8a7f5ce5059e1423b5399199d3f7398956329

  • SHA256

    6df186c3d5c563f492abed3e125ba4603f726bd1d257d4343f59d1584c0736db

  • SHA512

    a41cfa28fe323d3e69cf94145e97a41df59bff253acd7e377602d0cdfcf93416b8df0cc7c18c8514be8fd9999092124d132ac374e43110afc3d6a55d362e2f38

  • SSDEEP

    6144:g/1z+5QuL0f5QjKeVgv+v8mZFU2WKXFetnnOX7DKjimqcZfRPJXwOu1qlb:g/l8Qf5ct8A9WkFAnOXSqSJUqlb

Malware Config

Extracted

Family

fickerstealer

C2

fickitc.link:8080

Targets

    • Target

      library_2.exe

    • Size

      508KB

    • MD5

      88367344c224ae3ed9030cfcb389184a

    • SHA1

      a9b8a7f5ce5059e1423b5399199d3f7398956329

    • SHA256

      6df186c3d5c563f492abed3e125ba4603f726bd1d257d4343f59d1584c0736db

    • SHA512

      a41cfa28fe323d3e69cf94145e97a41df59bff253acd7e377602d0cdfcf93416b8df0cc7c18c8514be8fd9999092124d132ac374e43110afc3d6a55d362e2f38

    • SSDEEP

      6144:g/1z+5QuL0f5QjKeVgv+v8mZFU2WKXFetnnOX7DKjimqcZfRPJXwOu1qlb:g/l8Qf5ct8A9WkFAnOXSqSJUqlb

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks