Analysis
-
max time kernel
161s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 00:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7a4d99824f0be690c51bcbb88ea9449cfda966d88ff206a2184e87cbe13fe49d_JC.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
7a4d99824f0be690c51bcbb88ea9449cfda966d88ff206a2184e87cbe13fe49d_JC.exe
-
Size
334KB
-
MD5
dee364376c8ad99ff1ee640679aaa1be
-
SHA1
c929fdcae29f30c4853d1e450bef24b122e6be30
-
SHA256
7a4d99824f0be690c51bcbb88ea9449cfda966d88ff206a2184e87cbe13fe49d
-
SHA512
8f62cfb3a0b4113be84ca3a949f3e1069e68e2f0147a035a14071373d95cc0758ea2935b18d352f2bd5589be051a2d1afd31f76bcbe86746fb1219c6afbce483
-
SSDEEP
6144:zFZ8RIT6Eam4StJ3rXDf49Zu7SkDoPiaODgKYleQ4S4P:zIdSXDgjyrMAP
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3108-12-0x0000000003590000-0x00000000036C1000-memory.dmp family_fabookie behavioral2/memory/3108-15-0x0000000003590000-0x00000000036C1000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.