General

  • Target

    e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.zip

  • Size

    321KB

  • Sample

    221113-2spapsde68

  • MD5

    44520c747a6115625b31bf3bebfb1e42

  • SHA1

    7c661589981c8998609458408ff24d6c1555403a

  • SHA256

    857a0bedfc7e20c1ee7e8af72ad190f0c659b803c8051443ce64095348246c84

  • SHA512

    13a889e9678717e8657a6cc83b9fc0964f5c49e795f16200fdf1520601f500776f1b8a4b8d662769855025818a8a8427ea6072bad99350449921771edd2b4cc6

  • SSDEEP

    6144:Z6eSaopr5G7m4EnUgh68iYBvAh9zq09xy1LvQt90RDHXbBOMsZcJFyZf1lJQF0E:Z0lG7m4Hgh68i5h9zJ81TM0RROMsZE+Y

Malware Config

Extracted

Family

fickerstealer

C2

kefkfkf.link:8080

Targets

    • Target

      e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7.exe

    • Size

      408KB

    • MD5

      7144f017904a36ab19ebf81fe9bf035a

    • SHA1

      752b66f7ef137e876e88bb369f369f77a19976d5

    • SHA256

      e558c72cc9d709749a2afeca32409fe71b4038d27440d2a933b0ff8f47c9a0a7

    • SHA512

      30e561e621afdb9fa9c73b590dd67e257966cba6b62b899102371fcae1db5a7cbfbed0cc8adee1657c937e3e0587406ab1fa976e603466211203b5fc9de3dfff

    • SSDEEP

      12288:yFzPPn2KVdfuXzqSNYOtDw/EaYv59F1o+:Szf2MSfNvtXPv5a+

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks