Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 04:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4389fc9e95b214ac7cf515931ae9153450bcd4ccd7b7bad6a498da723ad602af.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
4389fc9e95b214ac7cf515931ae9153450bcd4ccd7b7bad6a498da723ad602af.exe
-
Size
334KB
-
MD5
2273152b5565d0d47b6c59cb5099dc76
-
SHA1
9d07cd1365117a602b696fe15d0e49b7cb5322b8
-
SHA256
4389fc9e95b214ac7cf515931ae9153450bcd4ccd7b7bad6a498da723ad602af
-
SHA512
1d8f6cb90f54554027436b34eba07833bd4dda01b1b3f3321ac13ae3d842cdecabcb8ee7e3692f992f1d81d51ef8762204ef3c61d616d6eefbcec12c633e670b
-
SSDEEP
6144:zFH8RIT6Fam1StJ3rXDW49Vl7SkDHPiaODgKYleQ4S4P:zWdGXDzP7aMAP
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/556-10-0x0000000003470000-0x00000000035A1000-memory.dmp family_fabookie behavioral2/memory/556-13-0x0000000003470000-0x00000000035A1000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.