Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2023 18:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
416KB
-
MD5
f9de699aea1d491fde2316a44ed30baf
-
SHA1
844316c2ca866eb93bd48803c9b94ba63015dceb
-
SHA256
6a6ec3bdeb4b01c7c1abdab5809ea290487c31010786f81ff64b6152a48274dd
-
SHA512
2aa9735e2abcd48006a8789c6ba19737f125d9c0c53e2e40c4db75a4a0fe0e7684025b43c940b2cb4d78c58d669dec8fcce239d7299bbaaf24bf18fb7d5d8f7a
-
SSDEEP
6144:syUa7AQnwciHMc4oiT4MKBz3I8JUGxerEhgVIXFM:sf4wcAQVrKi6berLIX
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/488-12-0x0000000002E60000-0x0000000002F91000-memory.dmp family_fabookie behavioral2/memory/488-15-0x0000000002E60000-0x0000000002F91000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.