General

  • Target

    237c10d4fbbc7218229e3b41aceb1a0d

  • Size

    595KB

  • Sample

    231231-cbfvkahggr

  • MD5

    237c10d4fbbc7218229e3b41aceb1a0d

  • SHA1

    18f1c2b7b788439cffd394068ef5c98764d1b6f3

  • SHA256

    79877ff84a9faa5618a8eb36af74ab50431dcb8dc6afb923e0010518e03d49a5

  • SHA512

    758abe7787817d5a5a40243daa06166f90873f07a159bcdff5ee6d99f21b6121447d4bb093fb871dd67d88fe35292092077a215b91bdd52db23c78e9ee2599c2

  • SSDEEP

    6144:eHS6bolVtRUhX4riR0e9xA3f/Oc674bpDS3sROWMoawMt3MW0rLAb56dpLN4XQKl:T6bo7gX4ri9m3XOYbEsRO5MW0rwrsu

Malware Config

Extracted

Family

fickerstealer

C2

80.87.192.115:80

Targets

    • Target

      237c10d4fbbc7218229e3b41aceb1a0d

    • Size

      595KB

    • MD5

      237c10d4fbbc7218229e3b41aceb1a0d

    • SHA1

      18f1c2b7b788439cffd394068ef5c98764d1b6f3

    • SHA256

      79877ff84a9faa5618a8eb36af74ab50431dcb8dc6afb923e0010518e03d49a5

    • SHA512

      758abe7787817d5a5a40243daa06166f90873f07a159bcdff5ee6d99f21b6121447d4bb093fb871dd67d88fe35292092077a215b91bdd52db23c78e9ee2599c2

    • SSDEEP

      6144:eHS6bolVtRUhX4riR0e9xA3f/Oc674bpDS3sROWMoawMt3MW0rLAb56dpLN4XQKl:T6bo7gX4ri9m3XOYbEsRO5MW0rwrsu

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks