Analysis

  • max time kernel
    132s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 23:54

General

  • Target

    05602d349a9f38b6abf8128dc689f6bb9fa73975cf6a1693b683d2bc7dedb298.exe

  • Size

    860KB

  • MD5

    469b2933fb4c6772b553e596c05835b1

  • SHA1

    7f1372922b7e4c2dbcd839be5bf6a7ac8fe1ab86

  • SHA256

    05602d349a9f38b6abf8128dc689f6bb9fa73975cf6a1693b683d2bc7dedb298

  • SHA512

    58707700ecee0f50fe413d08b3817fe7d50ccc4fbfabd27862f335473ffb3171ed8c2ce4386418093abf60469f8270c18a365cbf796049e993d5f46aded00b48

  • SSDEEP

    12288:V0GetS/ITJqrraq/t2qny6xdRhMAK4vcmPEl0Io:fuS/UEn/tUIMGPEl0I

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\05602d349a9f38b6abf8128dc689f6bb9fa73975cf6a1693b683d2bc7dedb298.exe
    "C:\Users\Admin\AppData\Local\Temp\05602d349a9f38b6abf8128dc689f6bb9fa73975cf6a1693b683d2bc7dedb298.exe"
    1⤵
      PID:3792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3792-0-0x00007FF70EF40000-0x00007FF70F019000-memory.dmp

      Filesize

      868KB

    • memory/3792-11-0x0000000002C50000-0x0000000002DC1000-memory.dmp

      Filesize

      1.4MB

    • memory/3792-12-0x0000000002DD0000-0x0000000002F01000-memory.dmp

      Filesize

      1.2MB

    • memory/3792-15-0x0000000002DD0000-0x0000000002F01000-memory.dmp

      Filesize

      1.2MB