Analysis
-
max time kernel
104s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 02:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a913b2046e7d919cc02f7fe509eb50d674cdf21be7122295fcaf9e5acdcfc3ac.exe
Resource
win7-20230220-en
0 signatures
150 seconds
General
-
Target
a913b2046e7d919cc02f7fe509eb50d674cdf21be7122295fcaf9e5acdcfc3ac.exe
-
Size
298KB
-
MD5
7a01ba8f880a998fe211bc59254f40ea
-
SHA1
fbf6d083f02a5fbf038894e5c9d9ec14f528dee6
-
SHA256
a913b2046e7d919cc02f7fe509eb50d674cdf21be7122295fcaf9e5acdcfc3ac
-
SHA512
4871bacc5355d6fe73e98c6ff1d95cf2df4292e6026415f89278d99a0022e9f6f12b76599f7316663d0c12475cb99a0d3556f1f597a0f1bdf2b563392eb32f94
-
SSDEEP
6144:6XMHxMrU3CEIkWCZ3j9Z0CIriNupxyN90vE:SMHxM3EPBkCIsey90
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4364-138-0x0000000002DF0000-0x0000000002F21000-memory.dmp family_fabookie behavioral2/memory/4364-139-0x0000000002DF0000-0x0000000002F21000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.