General

  • Target

    44f6fd295d232c354eeee0a9400a22cc

  • Size

    502KB

  • Sample

    240106-b6eejsfef7

  • MD5

    44f6fd295d232c354eeee0a9400a22cc

  • SHA1

    ece682d49c4de44a8dc1204c0c3ab2f5a6794e1b

  • SHA256

    74bbfe020e97e8756c092e2e9787c526e5a8e3d0c2c8ccbf80e10b1016ed3bc6

  • SHA512

    455e737d4826bccc056be8752a9b7d1ae38011169c9013d1fe30ccdcc051ef91f320215cc173929dc8821edce66e4a24b0797fbecc39b0ceec01ca87fb8fc408

  • SSDEEP

    6144:vcJoBE5x4ZGTTaufCeWDJjaUukihaE7kEYIMMMW0rLAb56dpLN4XQKJrsu:UJoBE0OTaTsIExMW0rwrsu

Malware Config

Extracted

Family

fickerstealer

C2

80.87.192.115:80

Targets

    • Target

      44f6fd295d232c354eeee0a9400a22cc

    • Size

      502KB

    • MD5

      44f6fd295d232c354eeee0a9400a22cc

    • SHA1

      ece682d49c4de44a8dc1204c0c3ab2f5a6794e1b

    • SHA256

      74bbfe020e97e8756c092e2e9787c526e5a8e3d0c2c8ccbf80e10b1016ed3bc6

    • SHA512

      455e737d4826bccc056be8752a9b7d1ae38011169c9013d1fe30ccdcc051ef91f320215cc173929dc8821edce66e4a24b0797fbecc39b0ceec01ca87fb8fc408

    • SSDEEP

      6144:vcJoBE5x4ZGTTaufCeWDJjaUukihaE7kEYIMMMW0rLAb56dpLN4XQKJrsu:UJoBE0OTaTsIExMW0rwrsu

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks