Analysis

  • max time kernel
    196s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 23:54

General

  • Target

    c7d97cf87cac0f033cae23440626b246c72b658e1c4c2e61a4b60969b8f63a95.exe

  • Size

    860KB

  • MD5

    536a81780e5a408bb7d040b3de206bf1

  • SHA1

    45e6ff5f2363bda42460d195e5c4044841a55693

  • SHA256

    c7d97cf87cac0f033cae23440626b246c72b658e1c4c2e61a4b60969b8f63a95

  • SHA512

    f7233e10ffb3754b48e2d2a9cc2115999f5fc6616f568e4a0651b61a8fe12f78229ded06f46b7f02d130dd1bebcb59eda711b369073c19d10962e429ef14e39d

  • SSDEEP

    12288:VyGetS/ITJqrraq/t2qny6xdRhMAK4vcmPEl0Io:tuS/UEn/tUIMGPEl0I

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7d97cf87cac0f033cae23440626b246c72b658e1c4c2e61a4b60969b8f63a95.exe
    "C:\Users\Admin\AppData\Local\Temp\c7d97cf87cac0f033cae23440626b246c72b658e1c4c2e61a4b60969b8f63a95.exe"
    1⤵
      PID:2660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2660-0-0x00007FF7B2090000-0x00007FF7B2169000-memory.dmp

      Filesize

      868KB

    • memory/2660-9-0x0000000003460000-0x00000000035D1000-memory.dmp

      Filesize

      1.4MB

    • memory/2660-10-0x00000000035E0000-0x0000000003711000-memory.dmp

      Filesize

      1.2MB

    • memory/2660-13-0x00000000035E0000-0x0000000003711000-memory.dmp

      Filesize

      1.2MB