General

  • Target

    8c2a81ef367ee5201eb8b279bd01fcbd

  • Size

    460KB

  • Sample

    240203-m591lshhfl

  • MD5

    8c2a81ef367ee5201eb8b279bd01fcbd

  • SHA1

    a56d72ac09d07435a33714f5002a64b2036f0218

  • SHA256

    5407f8bfd2bc57b84d211c95e1b16ff6f7c641c7bb0240acd2e8a77dc95104b8

  • SHA512

    aa77fccb9522abb63e3f97ec3dff1500464b6499745bf34eea2f1f91b2c7984d3578c93bd52bed0019f8cd671a4d3535b557471871049aef7dd94a1cce7f5b0f

  • SSDEEP

    6144:5jcPVnpIfWd+vFKz67t4GqMULAu5Rgk4xRwoOLKMW0rLAb56dpLN4XQKJrsu:5jcPVnphz6hqMU0u5RgjwoO+MW0rwrsu

Malware Config

Extracted

Family

fickerstealer

C2

80.87.192.115:80

Targets

    • Target

      8c2a81ef367ee5201eb8b279bd01fcbd

    • Size

      460KB

    • MD5

      8c2a81ef367ee5201eb8b279bd01fcbd

    • SHA1

      a56d72ac09d07435a33714f5002a64b2036f0218

    • SHA256

      5407f8bfd2bc57b84d211c95e1b16ff6f7c641c7bb0240acd2e8a77dc95104b8

    • SHA512

      aa77fccb9522abb63e3f97ec3dff1500464b6499745bf34eea2f1f91b2c7984d3578c93bd52bed0019f8cd671a4d3535b557471871049aef7dd94a1cce7f5b0f

    • SSDEEP

      6144:5jcPVnpIfWd+vFKz67t4GqMULAu5Rgk4xRwoOLKMW0rLAb56dpLN4XQKJrsu:5jcPVnphz6hqMU0u5RgjwoO+MW0rwrsu

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks