Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:25
Static task
static1
Behavioral task
behavioral1
Sample
892644435c434079e3480917019ebb6bba308377582aca0951617340f7621d18_JC.exe
Resource
win7-20230831-en
General
-
Target
892644435c434079e3480917019ebb6bba308377582aca0951617340f7621d18_JC.exe
-
Size
715KB
-
MD5
51ceadf4bccf5ab2b982aa9eff0aef98
-
SHA1
2c0ee90e0a13cb805a0dd0911f54a3031f57fc5c
-
SHA256
892644435c434079e3480917019ebb6bba308377582aca0951617340f7621d18
-
SHA512
9082f69881ea7ce5816e876e841261cbf37deedd9972c8615f4444aff83850cfa4f7bd7f7b87f26cc61dd559a3f6f09440bb6e45cd362caed67fadaf5c396260
-
SSDEEP
6144:XA01NdPuvxQWrSYYaER7ifbiERxQ7cUBmCUiJbc77ZvfuYuEdGxTC2JWf7xLUnwa:Xd25QWWqfb0ShtdGxTC2n5JL
Malware Config
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4864-10-0x0000000003150000-0x0000000003281000-memory.dmp family_fabookie behavioral2/memory/4864-13-0x0000000003150000-0x0000000003281000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.