General

  • Target

    95db6418da0c11842b06ec98495f327dca6428ce7575798d2c3a36eecac508a2.zip

  • Size

    298KB

  • Sample

    221114-lqhr5sbf4v

  • MD5

    5c4305dec389b7d5e636ab827610a6a6

  • SHA1

    33e2a3eb0723bc2a898f234929c8be82b7ec2770

  • SHA256

    4a15229f7d2142f22ef497a2a698836b5816d87e7c57a25c28b56c1ba8d2fd13

  • SHA512

    338a993740a48d5e94f70f5210fbc3fd95927d6bb7144a47659d5f44ed1f3297550a65685018dd4033821dc879fbe672b77ee0bebccd7e4d0c9dd11e2491bd46

  • SSDEEP

    6144:Dfe+lCFw8Pn4ED6EQ4pKiMc9N7t2TIu0Mcq4lEGvsNefYB1:be2CFPfLu74zrceCtefYX

Malware Config

Extracted

Family

fickerstealer

C2

fickita.info:8080

Targets

    • Target

      95db6418da0c11842b06ec98495f327dca6428ce7575798d2c3a36eecac508a2.exe

    • Size

      371KB

    • MD5

      265969856a9b0eebf03295101c2a75ba

    • SHA1

      f57aae5d8a6634d2cb3fb9255209e067e849228b

    • SHA256

      95db6418da0c11842b06ec98495f327dca6428ce7575798d2c3a36eecac508a2

    • SHA512

      16973e15dc7b7f41121bb2474aef6755a89db3fe11d0ecf62784ecb47e8ec30f9495c338965befff634a115b3628b961a432e61005a58fd827188d6d42dead55

    • SSDEEP

      6144:QsDlrgiL9cgPMhndCxsSsok5jNsIeA7PaflD8TleZk/YPstmKctTPjRMwU4b:Qsxki+8MNNlNB+9D2eGk48b

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks