General

  • Target

    273f1af201e27a51355ae1a73542a480

  • Size

    589KB

  • Sample

    231231-ekjzpaedgr

  • MD5

    273f1af201e27a51355ae1a73542a480

  • SHA1

    159905cc53d2a1b12be278bde34369bdf8b130a1

  • SHA256

    32ff140729fa9a72bbbff9500b010914da021a947bfeecb4917a2f6971fac33a

  • SHA512

    15bac17bda30369db33754cfecff1a7577663cab0ec0f358fd490043d2e5eb85bfc4fe61a1c81de545661e8a03e25b9b907fe77d6feb82a0d12298e3214da16f

  • SSDEEP

    12288:/pcGjTi0TpOZeowYIi6TXnKag7STMW0rwrsu:7jTi0sKXrg7wh3

Malware Config

Extracted

Family

fickerstealer

C2

80.87.192.115:80

Targets

    • Target

      273f1af201e27a51355ae1a73542a480

    • Size

      589KB

    • MD5

      273f1af201e27a51355ae1a73542a480

    • SHA1

      159905cc53d2a1b12be278bde34369bdf8b130a1

    • SHA256

      32ff140729fa9a72bbbff9500b010914da021a947bfeecb4917a2f6971fac33a

    • SHA512

      15bac17bda30369db33754cfecff1a7577663cab0ec0f358fd490043d2e5eb85bfc4fe61a1c81de545661e8a03e25b9b907fe77d6feb82a0d12298e3214da16f

    • SSDEEP

      12288:/pcGjTi0TpOZeowYIi6TXnKag7STMW0rwrsu:7jTi0sKXrg7wh3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks