General

  • Target

    3721f9d79d516bd3a1d702d080188e0474a965d66677e1645bce6bc318e238ac.zip

  • Size

    283KB

  • Sample

    221114-lqny6abf6w

  • MD5

    ca38a030fd6985a188a9ddfb238dc9b4

  • SHA1

    52c0fb6d19226fdda3af4c2e6075bce59d97f5f1

  • SHA256

    83b0ba8b5166704a485b5a95085b2d2ad4c2655fb32ca69b7b080077e0027658

  • SHA512

    fd195ebd381b1a275252615e4980707b1dbcf3d308cf229e8b7de4ced7666341f298339bb6bb0a245b523f4d79363500ea7df31d0d27731c43f60ad75032ce7e

  • SSDEEP

    6144:LTSIEJOawg5W2olEFPcbbH1v9fLbzJIOkROBR:HSIE2g5Zo6G5xJ9s4R

Malware Config

Extracted

Family

fickerstealer

C2

asfasfvcxvdbs.com:80

Targets

    • Target

      3721f9d79d516bd3a1d702d080188e0474a965d66677e1645bce6bc318e238ac.exe

    • Size

      468KB

    • MD5

      8c4eed6cc282b95bf2f9111ec302b0ad

    • SHA1

      f35fb25553e275650ffed48d3c14928ab0672c1c

    • SHA256

      3721f9d79d516bd3a1d702d080188e0474a965d66677e1645bce6bc318e238ac

    • SHA512

      934d674a2b09ac2554bbfdbd4300403937a294a0eddd1e6edc3acde51644b848effeea7416b0b5c1b162df8384938700543ef0fbc1a21a9e546b647a35a5dfe5

    • SSDEEP

      12288:hXmr/ivI/koLcGnrovCNpdE9fA8XaW0rN3:hXmCA/rovWw9ff63

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks