Analysis

  • max time kernel
    231s
  • max time network
    245s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 06:14

General

  • Target

    fd5882a614504a132bb2969ce1f67474e6ca74b0505d10af6cb41247b90f89d1_JC.exe

  • Size

    313KB

  • MD5

    82375b9d56ae05e88e451ed8662634b8

  • SHA1

    ef8f8b920a161097d1007ae4501ba555012c3b18

  • SHA256

    fd5882a614504a132bb2969ce1f67474e6ca74b0505d10af6cb41247b90f89d1

  • SHA512

    c1016745cb1160a87163b8969b5ea81980c600e3ca3eaa7a4f331f31b82703278a3b1a1d21694dea8494340fd83e0d4a90e3ce703950217967a124d2a0ec6536

  • SSDEEP

    3072:H0k/TMYQ0qIN65cVcOXqQK5ULK2AjPj05eyRS6CSfKVu1xgCAWU8fvJqxEm4x1ES:JM/c3qQP2FPjCp/1fvoxEvTE

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd5882a614504a132bb2969ce1f67474e6ca74b0505d10af6cb41247b90f89d1_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\fd5882a614504a132bb2969ce1f67474e6ca74b0505d10af6cb41247b90f89d1_JC.exe"
    1⤵
      PID:3484

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3484-0-0x00007FF679C00000-0x00007FF679C52000-memory.dmp

      Filesize

      328KB

    • memory/3484-9-0x00000000029D0000-0x0000000002B41000-memory.dmp

      Filesize

      1.4MB

    • memory/3484-10-0x0000000002B50000-0x0000000002C81000-memory.dmp

      Filesize

      1.2MB

    • memory/3484-13-0x0000000002B50000-0x0000000002C81000-memory.dmp

      Filesize

      1.2MB