General

  • Target

    a60307374104134c7f775d1bd652793c

  • Size

    477KB

  • Sample

    240226-lfnweaae8z

  • MD5

    a60307374104134c7f775d1bd652793c

  • SHA1

    ad13a05b1cd68afa43c9f917d3f5345e4d4eee3f

  • SHA256

    c39bc1f33b9d7881f9ad381bb77fa9dc5d8b6544d1039e964d2479cb8facb7f1

  • SHA512

    bd7c1f475f2057116d0fe30cd2dc38eae0536149f3016cba185445bcc8d494ba4566173b52b9577910c2933eb471353f38010d22157c4080f12a4d881101069e

  • SSDEEP

    6144:bercv61uPMEqKhGt/M4WHXkkGD/VRwFLHfeVRwoOLhMW0rLAb56dpLN4XQKJrsu:i4v+uMdmVIDtuFrGLwoOtMW0rwrsu

Malware Config

Extracted

Family

fickerstealer

C2

80.87.192.115:80

Targets

    • Target

      a60307374104134c7f775d1bd652793c

    • Size

      477KB

    • MD5

      a60307374104134c7f775d1bd652793c

    • SHA1

      ad13a05b1cd68afa43c9f917d3f5345e4d4eee3f

    • SHA256

      c39bc1f33b9d7881f9ad381bb77fa9dc5d8b6544d1039e964d2479cb8facb7f1

    • SHA512

      bd7c1f475f2057116d0fe30cd2dc38eae0536149f3016cba185445bcc8d494ba4566173b52b9577910c2933eb471353f38010d22157c4080f12a4d881101069e

    • SSDEEP

      6144:bercv61uPMEqKhGt/M4WHXkkGD/VRwFLHfeVRwoOLhMW0rLAb56dpLN4XQKJrsu:i4v+uMdmVIDtuFrGLwoOtMW0rwrsu

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks