Analysis
-
max time kernel
138s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2023 08:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
227b4cb6c4a4a6477dd18c6659c5f8ac.exe
Resource
win7-20230712-en
windows7-x64
4 signatures
150 seconds
General
-
Target
227b4cb6c4a4a6477dd18c6659c5f8ac.exe
-
Size
397KB
-
MD5
227b4cb6c4a4a6477dd18c6659c5f8ac
-
SHA1
d5ab18af347dd39e3bfdb92ed7bc4d2d21be35ac
-
SHA256
493ebf087d0a960507abe4cc4872f4a4e8a36a84799e3c9c3559e4295f9baf21
-
SHA512
4c348e8b6a57fdcc32e2a8dcd3c79532fbeb54d1667a500978660337033782f3faf713570ad17478c4e1c16ecbae5a291d5bf94bc14343a5d5dfc276744ec2c5
-
SSDEEP
1536:qyK9MV0CLSuOCWqeyGaOi2K+Sm6uCWqe+aOi2K+Sm6uuCuCWqeyGaOi2K+Sm6uC1:qX9M1uuNnAYy4AZ6TvcgJFW
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4708-10-0x0000000003D10000-0x0000000003E41000-memory.dmp family_fabookie behavioral2/memory/4708-13-0x0000000003D10000-0x0000000003E41000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.