Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 12:30
Static task
static1
Behavioral task
behavioral1
Sample
e6cbd8da9a712315ee4654b569a8cbb24433f677debc4ed5c738e537cdea6626.exe
Resource
win7-20230831-en
General
-
Target
e6cbd8da9a712315ee4654b569a8cbb24433f677debc4ed5c738e537cdea6626.exe
-
Size
313KB
-
MD5
a80a68f0421662a2a3ae7479b7b91ac4
-
SHA1
dfc8cd4e7787e7b268383e232b5df4e5c6ada6c2
-
SHA256
e6cbd8da9a712315ee4654b569a8cbb24433f677debc4ed5c738e537cdea6626
-
SHA512
14ee643c993ccd3995e60d1b3f0956984bd2af17132ac0ac8bef4c8aacc1ba191201c4460092e15313416dd900bfdf2fc708b4b1e0ef5347204a76b44ebc0bb1
-
SSDEEP
3072:H0k/TMYQ0qIN65cVcOXqQK5ULK2AjPj0ReyRS6CSfKVu1xgCAWU8fvJqxEm4x1ES:JM/c3qQP2FPjqp/1fvoxEvTE
Malware Config
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/240-10-0x0000000002E40000-0x0000000002F71000-memory.dmp family_fabookie behavioral2/memory/240-13-0x0000000002E40000-0x0000000002F71000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.