Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 02:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6a6ec3bdeb4b01c7c1abdab5809ea290487c31010786f81ff64b6152a48274dd.exe
Resource
win7-20231020-en
4 signatures
150 seconds
General
-
Target
6a6ec3bdeb4b01c7c1abdab5809ea290487c31010786f81ff64b6152a48274dd.exe
-
Size
416KB
-
MD5
f9de699aea1d491fde2316a44ed30baf
-
SHA1
844316c2ca866eb93bd48803c9b94ba63015dceb
-
SHA256
6a6ec3bdeb4b01c7c1abdab5809ea290487c31010786f81ff64b6152a48274dd
-
SHA512
2aa9735e2abcd48006a8789c6ba19737f125d9c0c53e2e40c4db75a4a0fe0e7684025b43c940b2cb4d78c58d669dec8fcce239d7299bbaaf24bf18fb7d5d8f7a
-
SSDEEP
6144:syUa7AQnwciHMc4oiT4MKBz3I8JUGxerEhgVIXFM:sf4wcAQVrKi6berLIX
Malware Config
Extracted
Family
fabookie
C2
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3876-10-0x0000000003760000-0x0000000003891000-memory.dmp family_fabookie behavioral2/memory/3876-13-0x0000000003760000-0x0000000003891000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.