Analysis

  • max time kernel
    146s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 02:18

General

  • Target

    cc85de344e8f04063d89aa593abf223c8c243e69969e4e4f3424d2a4bd96c86b.exe

  • Size

    860KB

  • MD5

    f43b4881f8f7b620ac5ef8b79bbf7ba3

  • SHA1

    fdbedcfc8d88b6801668114b2fb8e4e9984bd9cc

  • SHA256

    cc85de344e8f04063d89aa593abf223c8c243e69969e4e4f3424d2a4bd96c86b

  • SHA512

    c8bc187cd1836a247d16bd61ef70e1d48be586af9b369cab72efc9a1befeeed6ea57f560deefd9338114ddd28ccf562b4fe9741c0944faf5cf97859f087474cb

  • SSDEEP

    12288:CIGetS/ITJqrraq/t2qny6xdRhMAK4vcmPEl0Io:MuS/UEn/tUIMGPEl0I

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc85de344e8f04063d89aa593abf223c8c243e69969e4e4f3424d2a4bd96c86b.exe
    "C:\Users\Admin\AppData\Local\Temp\cc85de344e8f04063d89aa593abf223c8c243e69969e4e4f3424d2a4bd96c86b.exe"
    1⤵
      PID:1656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1656-0-0x00007FF6E8610000-0x00007FF6E86E9000-memory.dmp

      Filesize

      868KB

    • memory/1656-9-0x0000000002F60000-0x00000000030D1000-memory.dmp

      Filesize

      1.4MB

    • memory/1656-10-0x00000000030E0000-0x0000000003211000-memory.dmp

      Filesize

      1.2MB

    • memory/1656-11-0x00000000030E0000-0x0000000003211000-memory.dmp

      Filesize

      1.2MB