General

  • Target

    file.exe

  • Size

    422KB

  • Sample

    230123-pc6htseg4t

  • MD5

    5186e144010d4dd2cad53c7160832be3

  • SHA1

    80bc72747314eca557fbfcc0275fbffcb9b749df

  • SHA256

    2452b076ea5c2677bc20fb79b21f52fe5f85168c6115955e51b8a0c73dc72e2a

  • SHA512

    b5c98a734f9b6472b5ed1b6d279713cc4bccc2e33bb0710dce3f4065ba0a949551aa6809443138a81fe21ce3a3b4eeceb95fddf52de237a2713dd844ad55d22e

  • SSDEEP

    1536:Hpe6linkVlM4nAyO0DVPYuVN2y5esqFI+PlFwIrt:H8UWylM4JDVPYuL2y5ffWlFwIh

Malware Config

Extracted

Family

fickerstealer

C2

wejqwed.link:8080

Targets

    • Target

      file.exe

    • Size

      422KB

    • MD5

      5186e144010d4dd2cad53c7160832be3

    • SHA1

      80bc72747314eca557fbfcc0275fbffcb9b749df

    • SHA256

      2452b076ea5c2677bc20fb79b21f52fe5f85168c6115955e51b8a0c73dc72e2a

    • SHA512

      b5c98a734f9b6472b5ed1b6d279713cc4bccc2e33bb0710dce3f4065ba0a949551aa6809443138a81fe21ce3a3b4eeceb95fddf52de237a2713dd844ad55d22e

    • SSDEEP

      1536:Hpe6linkVlM4nAyO0DVPYuVN2y5esqFI+PlFwIrt:H8UWylM4JDVPYuL2y5ffWlFwIh

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks