Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 21:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b07054c987d03e105bf0c826cd0463a01b6565d8fcf4559e6a360bfca713e683_JC.exe
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b07054c987d03e105bf0c826cd0463a01b6565d8fcf4559e6a360bfca713e683_JC.exe
-
Size
334KB
-
MD5
7a6ace94bb9d92d33f2aafdc3799d2ce
-
SHA1
45d5abb2c85f2e3994870b0b745b11ead13fd85f
-
SHA256
b07054c987d03e105bf0c826cd0463a01b6565d8fcf4559e6a360bfca713e683
-
SHA512
3b65dd219b6e557e8e8526ac847662485043e673e77cb4b5589f3343402bdcfda694a747ef98afe40484a69f1e37672f23299aef5378049a1c2bc0230fdd9ae3
-
SSDEEP
6144:zFH8RIT6Fam1StJ3rXDW49Vl7SkDHPiaODgKYleQ4SsP:zWdGXDzP7aMEP
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3120-12-0x0000000002D50000-0x0000000002E81000-memory.dmp family_fabookie behavioral2/memory/3120-15-0x0000000002D50000-0x0000000002E81000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.