General

  • Target

    4e6b6918844989e1bacf66134b2c6edb.exe

  • Size

    570KB

  • Sample

    240109-xcfleahbe3

  • MD5

    4e6b6918844989e1bacf66134b2c6edb

  • SHA1

    a8aedd789317c3742821fc89bc0d5be7bf2f53b2

  • SHA256

    79098ca859c7c8f8c4a66fc490f6644897707a20530acfc997b4661cbfd9c2f9

  • SHA512

    01a72c39827afab094d76af3343c0314b5b6491b3f52f1635446199e81b1f20f0d2617ba76f14958e08e0120cc972cc730b0615f35e84f4dd5e7f69e4a5d387d

  • SSDEEP

    12288:K/TSo10VTwd9P6jVawmycTUHuBIJ4YMW0rwrsu:a0VTw6F+TRBIWYh3

Malware Config

Extracted

Family

fickerstealer

C2

80.87.192.115:80

Targets

    • Target

      4e6b6918844989e1bacf66134b2c6edb.exe

    • Size

      570KB

    • MD5

      4e6b6918844989e1bacf66134b2c6edb

    • SHA1

      a8aedd789317c3742821fc89bc0d5be7bf2f53b2

    • SHA256

      79098ca859c7c8f8c4a66fc490f6644897707a20530acfc997b4661cbfd9c2f9

    • SHA512

      01a72c39827afab094d76af3343c0314b5b6491b3f52f1635446199e81b1f20f0d2617ba76f14958e08e0120cc972cc730b0615f35e84f4dd5e7f69e4a5d387d

    • SSDEEP

      12288:K/TSo10VTwd9P6jVawmycTUHuBIJ4YMW0rwrsu:a0VTw6F+TRBIWYh3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks