Analysis
-
max time kernel
132s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 23:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
05602d349a9f38b6abf8128dc689f6bb9fa73975cf6a1693b683d2bc7dedb298.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
05602d349a9f38b6abf8128dc689f6bb9fa73975cf6a1693b683d2bc7dedb298.exe
-
Size
860KB
-
MD5
469b2933fb4c6772b553e596c05835b1
-
SHA1
7f1372922b7e4c2dbcd839be5bf6a7ac8fe1ab86
-
SHA256
05602d349a9f38b6abf8128dc689f6bb9fa73975cf6a1693b683d2bc7dedb298
-
SHA512
58707700ecee0f50fe413d08b3817fe7d50ccc4fbfabd27862f335473ffb3171ed8c2ce4386418093abf60469f8270c18a365cbf796049e993d5f46aded00b48
-
SSDEEP
12288:V0GetS/ITJqrraq/t2qny6xdRhMAK4vcmPEl0Io:fuS/UEn/tUIMGPEl0I
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3792-12-0x0000000002DD0000-0x0000000002F01000-memory.dmp family_fabookie behavioral2/memory/3792-15-0x0000000002DD0000-0x0000000002F01000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.