Analysis
-
max time kernel
231s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:14
Static task
static1
Behavioral task
behavioral1
Sample
fd5882a614504a132bb2969ce1f67474e6ca74b0505d10af6cb41247b90f89d1_JC.exe
Resource
win7-20230831-en
General
-
Target
fd5882a614504a132bb2969ce1f67474e6ca74b0505d10af6cb41247b90f89d1_JC.exe
-
Size
313KB
-
MD5
82375b9d56ae05e88e451ed8662634b8
-
SHA1
ef8f8b920a161097d1007ae4501ba555012c3b18
-
SHA256
fd5882a614504a132bb2969ce1f67474e6ca74b0505d10af6cb41247b90f89d1
-
SHA512
c1016745cb1160a87163b8969b5ea81980c600e3ca3eaa7a4f331f31b82703278a3b1a1d21694dea8494340fd83e0d4a90e3ce703950217967a124d2a0ec6536
-
SSDEEP
3072:H0k/TMYQ0qIN65cVcOXqQK5ULK2AjPj05eyRS6CSfKVu1xgCAWU8fvJqxEm4x1ES:JM/c3qQP2FPjCp/1fvoxEvTE
Malware Config
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3484-10-0x0000000002B50000-0x0000000002C81000-memory.dmp family_fabookie behavioral2/memory/3484-13-0x0000000002B50000-0x0000000002C81000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.