Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2023, 14:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d756fc20143f79f3661e6c01acca255e60b8e645c3e6e8fea1e3bce8e34d1045_JC.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
d756fc20143f79f3661e6c01acca255e60b8e645c3e6e8fea1e3bce8e34d1045_JC.exe
-
Size
334KB
-
MD5
15fa4fe448348d98873a2f4f358ac192
-
SHA1
3107270a4b9343a973011e81d1d4d78e80677c91
-
SHA256
d756fc20143f79f3661e6c01acca255e60b8e645c3e6e8fea1e3bce8e34d1045
-
SHA512
834b14749a25abad73675dc91e82adcc4811523de64e211e667028467a75d8de265295188f0bb164d803f5b0143a9b803b0e5f6b0b713ce08bacba5770f25e88
-
SSDEEP
6144:zFH8RIT6Fam1StJ3rXDW49Vl7SkDHPiaODgKYleQ4SkP:zWdGXDzP7aMMP
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/2884-10-0x0000000003070000-0x00000000031A1000-memory.dmp family_fabookie behavioral2/memory/2884-13-0x0000000003070000-0x00000000031A1000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.