Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 11:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownLoader45.59549.20406.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Trojan.DownLoader45.59549.20406.exe
-
Size
313KB
-
MD5
c5431ed88227d6f2e201da982db63f38
-
SHA1
9dcf0e8327f61df9641050fa30fa8a75642a2161
-
SHA256
dcd703912d6ff2ccc9739b82f12fb2c861812f53bb2ca9432a99850dd172fa94
-
SHA512
381ec81b6822d09903c3edbdee47c2364f797a9d1f047c896cd85f2fe87ddea10839f67b0ef9d148e9cc756322e14e3f1e57dbded0a0bf53416d8006a59284be
-
SSDEEP
3072:oVZTMYQ0qIN6NtVcOXHK5ULK2NUPj0reyRS6CSfKVu1xgCAWU8fvJqxEm4x1ESuS:YMnt3HP2PPjop/1fvoxEvTE
Malware Config
Extracted
Family
fabookie
C2
http://app.alie3ksgaa.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3752-10-0x0000000003050000-0x0000000003180000-memory.dmp family_fabookie behavioral2/memory/3752-13-0x0000000003050000-0x0000000003180000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.