General

  • Target

    Setup (password is THEPIRATEBAY007).zip

  • Size

    5.1MB

  • Sample

    241105-bscnss1fnd

  • MD5

    5a7b05af6be77d411d38e4b9603de6fb

  • SHA1

    890c2441287979341aea951ff1dd0e4e692493bf

  • SHA256

    f9ff859f39a9e54d733f9c3da77a0c42a4f9c6c53eccccfd7e874b8b5018ec96

  • SHA512

    ff24593ff5703675fd41c53acb35e6e36cf33baa660e23a005287eab482c6e79a0cd922efb2b82a6cdec3b8b425f6aeb37f71340b0cbca6ecc2f70475b4c3b2e

  • SSDEEP

    98304:Qay8P3DkDOgkjEBA43Or6uDfilxC0v+3ECjIir05+JKe5G6tZTaD027+mo:Qay8/6vDBAuOr6kYp+tEK6eKe5GoZF2k

Malware Config

Extracted

Family

fickerstealer

C2

45.93.201.181:80

Targets

    • Target

      Setup (password is THEPIRATEBAY007).zip

    • Size

      5.1MB

    • MD5

      5a7b05af6be77d411d38e4b9603de6fb

    • SHA1

      890c2441287979341aea951ff1dd0e4e692493bf

    • SHA256

      f9ff859f39a9e54d733f9c3da77a0c42a4f9c6c53eccccfd7e874b8b5018ec96

    • SHA512

      ff24593ff5703675fd41c53acb35e6e36cf33baa660e23a005287eab482c6e79a0cd922efb2b82a6cdec3b8b425f6aeb37f71340b0cbca6ecc2f70475b4c3b2e

    • SSDEEP

      98304:Qay8P3DkDOgkjEBA43Or6uDfilxC0v+3ECjIir05+JKe5G6tZTaD027+mo:Qay8/6vDBAuOr6kYp+tEK6eKe5GoZF2k

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Fickerstealer family

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks