Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 09:54
Static task
static1
Behavioral task
behavioral1
Sample
bf8092550afdf596dd95e8c38bc93b2fe7244dcac48fb2b95a2e1487c45cd9aa.exe
Resource
win7-20230831-en
General
-
Target
bf8092550afdf596dd95e8c38bc93b2fe7244dcac48fb2b95a2e1487c45cd9aa.exe
-
Size
636KB
-
MD5
a1e3d69810e55d924bf8ac091235110c
-
SHA1
1e200e3485a706cccd366a0587610a82193d435c
-
SHA256
bf8092550afdf596dd95e8c38bc93b2fe7244dcac48fb2b95a2e1487c45cd9aa
-
SHA512
d2a4d7e18d91e4732d949a85b055ae3e2b6d675aff525967d63edd904a42b37bfe264ebe20e88ba0d2a19421657743e91ca84a31660dccc7fe7ea837f76463b0
-
SSDEEP
6144:MfIWs1kdFDIZEkzJwz9OhcHQU8rATKbGHbI0/tGKP15Vuc7GHbI0/tGKP15Vuc1h:ubfatcH5049Duca049Duc1y6
Malware Config
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4948-10-0x0000000002CD0000-0x0000000002E01000-memory.dmp family_fabookie behavioral2/memory/4948-13-0x0000000002CD0000-0x0000000002E01000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.