Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 15:34

General

  • Target

    797344a5766214c49734b8f63f78e797.exe

  • Size

    369KB

  • MD5

    797344a5766214c49734b8f63f78e797

  • SHA1

    9635642026072bc12dcc5fdfb017b9c234c5bab8

  • SHA256

    aafa82fb621b4843c3ae89bb8beddfe66244e203149880b79a4e8f42f5a7c4b9

  • SHA512

    cacbf814ec9eeb5fa586cbf90437e82330d463d024af92a1a728b51e96d69ae0f6d8f7274691df534945accde3fb6c54c000095191d55d57653dfc1f0a8f6d9e

  • SSDEEP

    6144:uNOy9YUepRcisGiKzD8bFaggXWe0xZEOHHrpm1HUZLxRZEOHHrpm1HUZLx:uE+YUeprv0/tLpm10TtLpm10

Malware Config

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\797344a5766214c49734b8f63f78e797.exe
    "C:\Users\Admin\AppData\Local\Temp\797344a5766214c49734b8f63f78e797.exe"
    1⤵
      PID:3492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3492-0-0x00007FF6F8A30000-0x00007FF6F8A94000-memory.dmp

      Filesize

      400KB

    • memory/3492-9-0x0000000003AA0000-0x0000000003BAC000-memory.dmp

      Filesize

      1.0MB

    • memory/3492-10-0x0000000003CE0000-0x0000000003E11000-memory.dmp

      Filesize

      1.2MB

    • memory/3492-13-0x0000000003CE0000-0x0000000003E11000-memory.dmp

      Filesize

      1.2MB