Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 05:39
Static task
static1
1 signatures
General
-
Target
c82c8f3777d5193351ffc815625ad1e03e2816c88a4a4e0fdaf9c1fce8ba8921.exe
-
Size
416KB
-
MD5
637dbce64106ecb582f119403822e138
-
SHA1
da2989852244e0b0a90e8916635ab35c0f4906eb
-
SHA256
c82c8f3777d5193351ffc815625ad1e03e2816c88a4a4e0fdaf9c1fce8ba8921
-
SHA512
602a85efa48ada65dd74a76a3f814e652cf78b806947028e417f0d69c5fff49a33ab50c1ea434f629246b11b3609e0abfffe997e2521dcd030809cad5f2933db
-
SSDEEP
6144:syUa7AQnwciHMc4oiT4MKBz3I8JmGxerEhgVIXFM:sf4wcAQVrKi6FerLIX
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral1/memory/4408-10-0x00000000035E0000-0x0000000003711000-memory.dmp family_fabookie behavioral1/memory/4408-13-0x00000000035E0000-0x0000000003711000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.