General

  • Target

    19d2d1ecaa693fb74b39ac3f3a049f335dafba5d5669b921aab1a2c486ec77df

  • Size

    1.1MB

  • Sample

    230119-vp6l9agf69

  • MD5

    863693e30254434532cd8a493f632565

  • SHA1

    f54dbac3ae13df6f842baf253b6e80b0c0a8b47a

  • SHA256

    19d2d1ecaa693fb74b39ac3f3a049f335dafba5d5669b921aab1a2c486ec77df

  • SHA512

    024f5be15c520b4f813b0f7509183666875e2fe6a5aac0e291f663b33e0f8c7c4a64f057278201de84af7aae6085edb54fb98e30890f8136a84d7afb5e02670b

  • SSDEEP

    12288:I5dMOMt/9NH/eNYmItwRHAR315ycgVkIHG9scLKt97NXTPTFyPPeIETaq:4VYLHY0tMgyJZcOt7dyh

Malware Config

Extracted

Family

fickerstealer

C2

91.240.118.51:80

Targets

    • Target

      19d2d1ecaa693fb74b39ac3f3a049f335dafba5d5669b921aab1a2c486ec77df

    • Size

      1.1MB

    • MD5

      863693e30254434532cd8a493f632565

    • SHA1

      f54dbac3ae13df6f842baf253b6e80b0c0a8b47a

    • SHA256

      19d2d1ecaa693fb74b39ac3f3a049f335dafba5d5669b921aab1a2c486ec77df

    • SHA512

      024f5be15c520b4f813b0f7509183666875e2fe6a5aac0e291f663b33e0f8c7c4a64f057278201de84af7aae6085edb54fb98e30890f8136a84d7afb5e02670b

    • SSDEEP

      12288:I5dMOMt/9NH/eNYmItwRHAR315ycgVkIHG9scLKt97NXTPTFyPPeIETaq:4VYLHY0tMgyJZcOt7dyh

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

MITRE ATT&CK Enterprise v6

Tasks