Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 05:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d641a8c632aa4b393491a9bd2a1407e3.exe
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
d641a8c632aa4b393491a9bd2a1407e3.exe
-
Size
369KB
-
MD5
d641a8c632aa4b393491a9bd2a1407e3
-
SHA1
808947f3c5545219bb45ac931e96cbec672e620b
-
SHA256
39415ee7b412df72b4ee1109ba32e987904734c3cfbffa6bcb6b579415449dba
-
SHA512
819c323ec2487a4f4de75421ec7e1cdc4668ac2fe9422bd633d6e20430f656dd352dbf2b279dac37ed30301568c51640252c7035774b440558248a76a731f183
-
SSDEEP
6144:uNOy9YUepRcisGiKzD8bFaggXWe0BZEOHHrpm1HUZLxRZEOHHrpm1HUZLx:uE+YUeprv0vtLpm10TtLpm10
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/1068-10-0x00000000034F0000-0x0000000003621000-memory.dmp family_fabookie behavioral2/memory/1068-13-0x00000000034F0000-0x0000000003621000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.