General

  • Target

    09ea8b7a293680b68a8848e245f8279d

  • Size

    594KB

  • Sample

    231230-bqme8ahden

  • MD5

    09ea8b7a293680b68a8848e245f8279d

  • SHA1

    7b093868d74da5001d770892146981716968103c

  • SHA256

    eaa58bc8f2a78622e1841ba82b8457ed8fa20647eeefd353020db7941720b9de

  • SHA512

    6791697c2172caf129d43f14c3d1086f704396ae701e76fadb4ba59dc172dcdc770cafdeb68f6b8832f744a1ae9d5637ce319d07e00445308dfe99e39b6da638

  • SSDEEP

    12288:3AmIQeYRQT9xY0UkTD6InIQSeUMBOwmRSAMW0rwrsu:cQetI90OwmkAh3

Malware Config

Extracted

Family

fickerstealer

C2

80.87.192.115:80

Targets

    • Target

      09ea8b7a293680b68a8848e245f8279d

    • Size

      594KB

    • MD5

      09ea8b7a293680b68a8848e245f8279d

    • SHA1

      7b093868d74da5001d770892146981716968103c

    • SHA256

      eaa58bc8f2a78622e1841ba82b8457ed8fa20647eeefd353020db7941720b9de

    • SHA512

      6791697c2172caf129d43f14c3d1086f704396ae701e76fadb4ba59dc172dcdc770cafdeb68f6b8832f744a1ae9d5637ce319d07e00445308dfe99e39b6da638

    • SSDEEP

      12288:3AmIQeYRQT9xY0UkTD6InIQSeUMBOwmRSAMW0rwrsu:cQetI90OwmkAh3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks