Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 02:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cc85de344e8f04063d89aa593abf223c8c243e69969e4e4f3424d2a4bd96c86b.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
cc85de344e8f04063d89aa593abf223c8c243e69969e4e4f3424d2a4bd96c86b.exe
-
Size
860KB
-
MD5
f43b4881f8f7b620ac5ef8b79bbf7ba3
-
SHA1
fdbedcfc8d88b6801668114b2fb8e4e9984bd9cc
-
SHA256
cc85de344e8f04063d89aa593abf223c8c243e69969e4e4f3424d2a4bd96c86b
-
SHA512
c8bc187cd1836a247d16bd61ef70e1d48be586af9b369cab72efc9a1befeeed6ea57f560deefd9338114ddd28ccf562b4fe9741c0944faf5cf97859f087474cb
-
SSDEEP
12288:CIGetS/ITJqrraq/t2qny6xdRhMAK4vcmPEl0Io:MuS/UEn/tUIMGPEl0I
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/1656-10-0x00000000030E0000-0x0000000003211000-memory.dmp family_fabookie behavioral2/memory/1656-11-0x00000000030E0000-0x0000000003211000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.