Analysis
-
max time kernel
102s -
max time network
119s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
22/07/2023, 02:59
Static task
static1
1 signatures
General
-
Target
9e19254c7d883042ec921751914e1a976264b48790523fc0ff29d5cf0fa78be3.exe
-
Size
313KB
-
MD5
0c7e35ba959515064a83f9d7f2e0db60
-
SHA1
29282c93e39b48c63e69cf3eb1e6020d15f43869
-
SHA256
9e19254c7d883042ec921751914e1a976264b48790523fc0ff29d5cf0fa78be3
-
SHA512
5a3b2ab1c291c015a3e4d3776f8e7da4e96738598120cc38afeb8cce5c08007675f9e1a82ff6fd0b2492098ac59b046d7ee3cb1a2dc9bb1e980f1c1d7671dfd6
-
SSDEEP
3072:obk2MYQ0qiN6NtVcOX3K5ULK2zUPj0YeyRS6CSfKVu1xgCAWU8fvJqxEm4x1ESuS:SM1t33P2hPjXp/1fvoxEvTE
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/3392-121-0x0000000003220000-0x0000000003351000-memory.dmp family_fabookie behavioral1/memory/3392-124-0x0000000003220000-0x0000000003351000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.