General

  • Target

    2bf337fda9a8a74a0494da655d52e377.exe

  • Size

    366KB

  • Sample

    230105-zq1jvadc63

  • MD5

    2bf337fda9a8a74a0494da655d52e377

  • SHA1

    86c04a472c90a7e0b33b0f9dbbfa3c3e86f79b0d

  • SHA256

    087e07ea636995a1249f0196c4cf9e228c8112e44171d5fdcda61fcbc72ac39a

  • SHA512

    3447a0ecd64d6680b4304f1454bd34ab6529954780b4e82b82bd810899349598b8e417989f09a6f5201d98807031a75c649cf6a7474563dedb2e85e4d10e88c1

  • SSDEEP

    6144:lECLE2HsQxQiRdRvYr7F6REk5004ibv32DntOA/6+9ZY4BA+IatO:lECI2HsQZ1v07EREky04iLUtOA/6iyr9

Malware Config

Extracted

Family

fickerstealer

C2

ed2efjw.link:8080

Targets

    • Target

      2bf337fda9a8a74a0494da655d52e377.exe

    • Size

      366KB

    • MD5

      2bf337fda9a8a74a0494da655d52e377

    • SHA1

      86c04a472c90a7e0b33b0f9dbbfa3c3e86f79b0d

    • SHA256

      087e07ea636995a1249f0196c4cf9e228c8112e44171d5fdcda61fcbc72ac39a

    • SHA512

      3447a0ecd64d6680b4304f1454bd34ab6529954780b4e82b82bd810899349598b8e417989f09a6f5201d98807031a75c649cf6a7474563dedb2e85e4d10e88c1

    • SSDEEP

      6144:lECLE2HsQxQiRdRvYr7F6REk5004ibv32DntOA/6+9ZY4BA+IatO:lECI2HsQZ1v07EREky04iLUtOA/6iyr9

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks