Analysis
-
max time kernel
196s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 23:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c7d97cf87cac0f033cae23440626b246c72b658e1c4c2e61a4b60969b8f63a95.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
c7d97cf87cac0f033cae23440626b246c72b658e1c4c2e61a4b60969b8f63a95.exe
-
Size
860KB
-
MD5
536a81780e5a408bb7d040b3de206bf1
-
SHA1
45e6ff5f2363bda42460d195e5c4044841a55693
-
SHA256
c7d97cf87cac0f033cae23440626b246c72b658e1c4c2e61a4b60969b8f63a95
-
SHA512
f7233e10ffb3754b48e2d2a9cc2115999f5fc6616f568e4a0651b61a8fe12f78229ded06f46b7f02d130dd1bebcb59eda711b369073c19d10962e429ef14e39d
-
SSDEEP
12288:VyGetS/ITJqrraq/t2qny6xdRhMAK4vcmPEl0Io:tuS/UEn/tUIMGPEl0I
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/2660-10-0x00000000035E0000-0x0000000003711000-memory.dmp family_fabookie behavioral2/memory/2660-13-0x00000000035E0000-0x0000000003711000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.