Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 11:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
715KB
-
MD5
51ceadf4bccf5ab2b982aa9eff0aef98
-
SHA1
2c0ee90e0a13cb805a0dd0911f54a3031f57fc5c
-
SHA256
892644435c434079e3480917019ebb6bba308377582aca0951617340f7621d18
-
SHA512
9082f69881ea7ce5816e876e841261cbf37deedd9972c8615f4444aff83850cfa4f7bd7f7b87f26cc61dd559a3f6f09440bb6e45cd362caed67fadaf5c396260
-
SSDEEP
6144:XA01NdPuvxQWrSYYaER7ifbiERxQ7cUBmCUiJbc77ZvfuYuEdGxTC2JWf7xLUnwa:Xd25QWWqfb0ShtdGxTC2n5JL
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3660-10-0x00000000037A0000-0x00000000038D1000-memory.dmp family_fabookie behavioral2/memory/3660-13-0x00000000037A0000-0x00000000038D1000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.