Analysis
-
max time kernel
99s -
max time network
130s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
17-08-2023 09:51
Static task
static1
1 signatures
General
-
Target
625f3f00c2a47c63b59a89867b89b07026ee3d159a1cc71203d42c291dd527ea.exe
-
Size
933KB
-
MD5
c1ab19d253ae9e051d81584121ab49fc
-
SHA1
aecf48240aedb1d3030306aae6fc34d79a73cb3c
-
SHA256
625f3f00c2a47c63b59a89867b89b07026ee3d159a1cc71203d42c291dd527ea
-
SHA512
beef0cb0919d7de10c19b08396c0d41419c290a37a619fa279f7f9ff4a2fb068ee75bf42fb215a0243fc1466ca81e0ab91332126a2d10482f47e60f596010ba2
-
SSDEEP
12288:K72Nib/80Dp0E3d51qvii3mmm6AV5Cqylkg5ZQnXlV5Za5Za5Zj:GrTtd5kRhAVdcpmt44F
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/3532-132-0x00000000034A0000-0x00000000035D1000-memory.dmp family_fabookie behavioral1/memory/3532-135-0x00000000034A0000-0x00000000035D1000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.