General

  • Target

    4f2093aec19a195812a702d02ac8ae45

  • Size

    607KB

  • Sample

    240110-a2jyssbgh5

  • MD5

    4f2093aec19a195812a702d02ac8ae45

  • SHA1

    b8edfaa48bdf0cc5811b0138779b2d7a3526c6c8

  • SHA256

    2a6df2bbac1237d04c3c6d83434ca709a50692630dc636e419086504d58d0d8b

  • SHA512

    8f69dc70b1582f128496d829d497dbb4961277bc363bbc369b0e60623cfb5dc8c11f7dfe91e7f32a0d2ad24f91e42df1f60377e1a866e5aa4d83a9dd16d29f9e

  • SSDEEP

    12288:0oCrbmN/5CvDA8Qm3edyCPzY5GvzAie65MW0rwrsu:6rbmNMvjhC7cMeGh3

Malware Config

Extracted

Family

fickerstealer

C2

80.87.192.115:80

Targets

    • Target

      4f2093aec19a195812a702d02ac8ae45

    • Size

      607KB

    • MD5

      4f2093aec19a195812a702d02ac8ae45

    • SHA1

      b8edfaa48bdf0cc5811b0138779b2d7a3526c6c8

    • SHA256

      2a6df2bbac1237d04c3c6d83434ca709a50692630dc636e419086504d58d0d8b

    • SHA512

      8f69dc70b1582f128496d829d497dbb4961277bc363bbc369b0e60623cfb5dc8c11f7dfe91e7f32a0d2ad24f91e42df1f60377e1a866e5aa4d83a9dd16d29f9e

    • SSDEEP

      12288:0oCrbmN/5CvDA8Qm3edyCPzY5GvzAie65MW0rwrsu:6rbmNMvjhC7cMeGh3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks