Analysis
-
max time kernel
116s -
max time network
129s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
28-09-2023 12:54
Static task
static1
1 signatures
General
-
Target
f6147edac0f3bf98bf8360176358fe4b4eeeca097325a501dcd32916b60fbe28.exe
-
Size
416KB
-
MD5
b72c1dbf8fec4961378a5a369cfa7ee4
-
SHA1
47193a3fc3cc9c24c603fa25aa92ca19f1e29a4e
-
SHA256
f6147edac0f3bf98bf8360176358fe4b4eeeca097325a501dcd32916b60fbe28
-
SHA512
b8f63bd1deb9cbe7d47b3130575792e03d53b7d31fa65c99fdf640f786226d1747d3a556a1f30df03a7973331277e221206c65a22c9d2d4d49ee34dfda1a5f10
-
SSDEEP
6144:syUa7AQnwciHMc4oiT4MKBz3I8JWGxerEhgVIXFM:sf4wcAQVrKi61erLIX
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/756-12-0x0000000002F60000-0x0000000003091000-memory.dmp family_fabookie behavioral1/memory/756-15-0x0000000002F60000-0x0000000003091000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.