General

  • Target

    78dce934e15d7dd8be0038d350f32d1d02128b560fb328f954ce44b7fead353e.zip

  • Size

    285KB

  • Sample

    221114-lqqgzsbf6z

  • MD5

    290ac2eb0b85f8ca645941bbe3167639

  • SHA1

    4efc4747a576f3c506d5dfb093c6e58cb539bd9b

  • SHA256

    f53b77510866378e4a7e9b49519505390398fb75169782235853b1425e2544d2

  • SHA512

    a6ec963da4eed4c1437511042170cb63fb388ee873c2b5ff65517bbdf8679b5f662b950e154eaba2f621c75cef9b33cb1fb7dac52b9162b3965e51de088ee729

  • SSDEEP

    6144:cccNAFwPAxlk/gXpROxYRc3sTmgu2wxu2Xbm8Dk8v:1cfYxlGgv6du2Xb3Fv

Malware Config

Extracted

Family

fickerstealer

C2

asfasfvcxvdbs.com:80

Targets

    • Target

      78dce934e15d7dd8be0038d350f32d1d02128b560fb328f954ce44b7fead353e.exe

    • Size

      470KB

    • MD5

      9fdeed473f923e282c4394ff58191cbc

    • SHA1

      2ba8aafc4717afd8d374448b2193adba7a3d3f11

    • SHA256

      78dce934e15d7dd8be0038d350f32d1d02128b560fb328f954ce44b7fead353e

    • SHA512

      f25a915edb13ab797dcb128050b24aa1da90a0531d7d5d2a482e2c7ad74b2dc9792fdf1db4e75fa474e266718a3cdc47468ad6422c54d9498fce588a3d9ddb95

    • SSDEEP

      6144:i+0ZycPjPPztWO/9adNDF5AJxbjYfC1lAAJB/L1XaW0rLFb56dpLN4XQKJ3:QycPzPztWuad5ebj09AnxXaW0rN3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks