Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 00:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ce6ddf38ddc57698642bc07efc9088f66f1a6fcb421851fe668b84e7f1169726_JC.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
ce6ddf38ddc57698642bc07efc9088f66f1a6fcb421851fe668b84e7f1169726_JC.exe
-
Size
416KB
-
MD5
41484c18078fdced5621a0d209d91911
-
SHA1
6cd4ef47e7f9408a18a590d86401f4c3769e2d79
-
SHA256
ce6ddf38ddc57698642bc07efc9088f66f1a6fcb421851fe668b84e7f1169726
-
SHA512
1864f62303606663c9e396e1c9395c52f35e5b94d34795560233dfb6a786b1228b7b46a736fc6781bfc15ff34e71ed084a60aefa1a57857bdbdc484bed058449
-
SSDEEP
6144:TyqO7oQLwFiHMmoiT4MKBz3I8JDGxerEhgVIXFM:TlwUFA9VrKi6+erLIX
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/1544-10-0x0000000003380000-0x00000000034B1000-memory.dmp family_fabookie behavioral2/memory/1544-13-0x0000000003380000-0x00000000034B1000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.