General

  • Target

    0e7d5f23ce2fdc3320d257a952444609_JaffaCakes118

  • Size

    556KB

  • Sample

    240328-yhxybaeh4t

  • MD5

    0e7d5f23ce2fdc3320d257a952444609

  • SHA1

    2b421eb8c9e27b5bdd113d1f45054d8eafa48726

  • SHA256

    6fc629fbf3a2155e080a6c65fde3db4fe84c3e818c20a3b4b9fb39242cbb2361

  • SHA512

    33b168293d0e192df369d7d4afff1915038179803782c4225a5cd6fcb26405eceba7c93045d27acbecbc4f6d9af0cc415a460988d95f207f7379c043e7495332

  • SSDEEP

    6144:IaqPFf30Cjo4qbLoa3+iAn9z/ax02ngRlyMnx1CByTqsV90MW0rLAb56dpLN4XQq:BqVjZq/ow+DnoS2ngRlh1CByTQMW0rw3

Malware Config

Extracted

Family

fickerstealer

C2

game2030.site:80

Targets

    • Target

      0e7d5f23ce2fdc3320d257a952444609_JaffaCakes118

    • Size

      556KB

    • MD5

      0e7d5f23ce2fdc3320d257a952444609

    • SHA1

      2b421eb8c9e27b5bdd113d1f45054d8eafa48726

    • SHA256

      6fc629fbf3a2155e080a6c65fde3db4fe84c3e818c20a3b4b9fb39242cbb2361

    • SHA512

      33b168293d0e192df369d7d4afff1915038179803782c4225a5cd6fcb26405eceba7c93045d27acbecbc4f6d9af0cc415a460988d95f207f7379c043e7495332

    • SSDEEP

      6144:IaqPFf30Cjo4qbLoa3+iAn9z/ax02ngRlyMnx1CByTqsV90MW0rLAb56dpLN4XQq:BqVjZq/ow+DnoS2ngRlh1CByTQMW0rw3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks