Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 08:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
esgla2i5.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
esgla2i5.exe
-
Size
416KB
-
MD5
a9d0116229cfcbc400d79dd38d000439
-
SHA1
6db7482415c34c9344e22f391b0b53d6c47a6913
-
SHA256
f2fb971f8d6e9472181e41daa66ebbde7430acd541694e921ca1d44b1c50d1e1
-
SHA512
6761ccbb3a29aceddadb2baafd1a2dff71766184d92d5172e6965a9fb75b51fca2c1aeed20f9944ab5ae690f4fb79548647cca26904b244bef4f964da523b9a4
-
SSDEEP
6144:syUa7AQnwciHMc4oiT4MKBz3I8J6GxerEhgVIXFM:sf4wcAQVrKi6perLIX
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/1920-10-0x0000000003900000-0x0000000003A31000-memory.dmp family_fabookie behavioral2/memory/1920-13-0x0000000003900000-0x0000000003A31000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.