General

  • Target

    54806c9ae127f08fbb2e304c25b13f79

  • Size

    534KB

  • Sample

    240111-y85qvaggf3

  • MD5

    54806c9ae127f08fbb2e304c25b13f79

  • SHA1

    7000b2011ea98b3b24779a65224c6d2f8bbf692f

  • SHA256

    d18e4579ede259c8adc93f9b109e422cc5f040c205f175a1bbb862d681325751

  • SHA512

    02777c92c488257b9059fff1cf638f026ba4eb7778c93f49ae5091095e78d080ce4032249aa33cfa2a782465717d1cda0928bce5423d562faf5fd776c4af5a8c

  • SSDEEP

    12288:X4t/JTIjQdGy8bFE/eP7UERExMW0rwrsu:EJUQdh8Z37Zmh3

Malware Config

Extracted

Family

fickerstealer

C2

80.87.192.115:80

Targets

    • Target

      54806c9ae127f08fbb2e304c25b13f79

    • Size

      534KB

    • MD5

      54806c9ae127f08fbb2e304c25b13f79

    • SHA1

      7000b2011ea98b3b24779a65224c6d2f8bbf692f

    • SHA256

      d18e4579ede259c8adc93f9b109e422cc5f040c205f175a1bbb862d681325751

    • SHA512

      02777c92c488257b9059fff1cf638f026ba4eb7778c93f49ae5091095e78d080ce4032249aa33cfa2a782465717d1cda0928bce5423d562faf5fd776c4af5a8c

    • SSDEEP

      12288:X4t/JTIjQdGy8bFE/eP7UERExMW0rwrsu:EJUQdh8Z37Zmh3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks