Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 11:41
Static task
static1
Behavioral task
behavioral1
Sample
9174951098e4ca03d8902442071ec42c1d2dc4c9d689d36c7111c78367ce720b.exe
Resource
win7-20230831-en
General
-
Target
9174951098e4ca03d8902442071ec42c1d2dc4c9d689d36c7111c78367ce720b.exe
-
Size
715KB
-
MD5
fbd284d0258ccb71f53ef879b6ab70c5
-
SHA1
8f23931cf757555f81ee4cca759ab1c214a98871
-
SHA256
9174951098e4ca03d8902442071ec42c1d2dc4c9d689d36c7111c78367ce720b
-
SHA512
b82814bad9904481af790e976e1a2a991ddbf3f59bd37515689b31171c1e484bae4cb619c6168f04329dd3be55ebeb15010547b4ca0f8a04f67ff4b7bdf426ef
-
SSDEEP
6144:XA01NdPuvxQWrSYYaER7ifbiERxQ7cUBmCUiJbc77ZvfuYuEdGxTC2ZWf7xLUnwa:Xd25QWWqfb0ShtdGxTC2X5JL
Malware Config
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/396-10-0x00000000038A0000-0x00000000039D1000-memory.dmp family_fabookie behavioral2/memory/396-13-0x00000000038A0000-0x00000000039D1000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.