General

  • Target

    2a454ebe8ba40a5ea033f91307862f80

  • Size

    507KB

  • Sample

    231231-ga4x8ahcc4

  • MD5

    2a454ebe8ba40a5ea033f91307862f80

  • SHA1

    cc7f9ea6db6a44293bdd53dab6e032d2f8c0e742

  • SHA256

    2fbe9b55c293c3428a9cdf476ef094e1235e27cab28055aca0c5258840b03c4e

  • SHA512

    f31089da47211dd27c94a76f013f784c8549688260b239bc4c4d8605a3a5d3c334620458a0ebbc7214c9efaaa11ac4d778a3df4757d9a3ae28279b060d1fbe87

  • SSDEEP

    12288:andJLz2MxPWVMuySre8OL7TLpdk1EW0rF3:uLz2MVKeTLNdWy3

Malware Config

Extracted

Family

fickerstealer

C2

mistral3.xyz:80

Targets

    • Target

      2a454ebe8ba40a5ea033f91307862f80

    • Size

      507KB

    • MD5

      2a454ebe8ba40a5ea033f91307862f80

    • SHA1

      cc7f9ea6db6a44293bdd53dab6e032d2f8c0e742

    • SHA256

      2fbe9b55c293c3428a9cdf476ef094e1235e27cab28055aca0c5258840b03c4e

    • SHA512

      f31089da47211dd27c94a76f013f784c8549688260b239bc4c4d8605a3a5d3c334620458a0ebbc7214c9efaaa11ac4d778a3df4757d9a3ae28279b060d1fbe87

    • SSDEEP

      12288:andJLz2MxPWVMuySre8OL7TLpdk1EW0rF3:uLz2MVKeTLNdWy3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks