Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 12:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ce942cdc58ba5fa628d97f991c8a794294c2acfb724efbf0ac887c47942a31e.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
7ce942cdc58ba5fa628d97f991c8a794294c2acfb724efbf0ac887c47942a31e.exe
-
Size
416KB
-
MD5
83330cf6e88ad32365183f31b1fd3bda
-
SHA1
1c5b47be2b8713746de64b39390636a81626d264
-
SHA256
7ce942cdc58ba5fa628d97f991c8a794294c2acfb724efbf0ac887c47942a31e
-
SHA512
e28a9c47f690b0b0f0dd3b946d9cd59c761803f3826a382208a5b92be1293067b37a39f1141ddda13247b96138a108ce2f85b83de0143d48d4acc94f69a11908
-
SSDEEP
6144:syUa7AQnwciHMc4oiT4MKBz3I8JKGxerEhgVIXFM:sf4wcAQVrKi65erLIX
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3624-10-0x0000000003070000-0x00000000031A1000-memory.dmp family_fabookie behavioral2/memory/3624-13-0x0000000003070000-0x00000000031A1000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.