General

  • Target

    f1107d0bce75510a76fc68a917c48afc205459471e22a95dbbd0e52dbd445075.zip

  • Size

    255KB

  • Sample

    221114-lqk79sbf5t

  • MD5

    907c1317ed5315dae0ca1ca27ca6dd29

  • SHA1

    9c38ca0489b2812850c2c0811ed7bae5cd9bf93d

  • SHA256

    923f0004d98184c745251b3adc3210d6ece6a22a9d463670a86de0285e3b561d

  • SHA512

    9c64d04d543cace702502e8b30fd892f788a275d38f2901ffb5588fa9d1f385271b6336f761aeb1bba8a66504fb882e70bc3dcd93362121363db651e37069a1d

  • SSDEEP

    6144:vMYeMFoMcwiJ5a2SU3fkPgyBLa4Omyb4YPds3oFbsi9V5:v7eMFo5SGf8gyBmmybVTb5

Malware Config

Extracted

Family

fickerstealer

C2

asfasfvcxvdbs.com:80

Targets

    • Target

      f1107d0bce75510a76fc68a917c48afc205459471e22a95dbbd0e52dbd445075.exe

    • Size

      415KB

    • MD5

      e3bf6d17db40ba1a967df90bc3ba3e4f

    • SHA1

      25ae8565ae5eae94e3dd06955b908a3cdc53623f

    • SHA256

      f1107d0bce75510a76fc68a917c48afc205459471e22a95dbbd0e52dbd445075

    • SHA512

      6e15e220e693c9b217d845a020a1444a4c885e5853dbdc518a045464a40a0436a76fd8fd710e777d2588e1886af8262cf44eef6f508ac7c0139f658fa4fb2012

    • SSDEEP

      6144:TqUMjfPJt/I7RnfDmMOkFnjuZgFK+IdJsI5/eXaW0rLFb56dpLN4XQKJ3:+UsJpItjOanSAl6mcGXaW0rN3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks