Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2024 06:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownLoader45.59549.17549.11156.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Trojan.DownLoader45.59549.17549.11156.exe
-
Size
313KB
-
MD5
a8259a11d59c3a297ba937c0968c0049
-
SHA1
bbd5d04128390bcb9c03c11fe70d773ba2250040
-
SHA256
5e6e334f51fcceeb86affb44bf6cc8f9f12e95a4aa0427d35f4f954397dc8d05
-
SHA512
7e87f3926aa56be946948e604b6167fc22c1fd87b029fa6d944e0f6002c6942b6c5bd6566010eda64e06d59521dbf35c701c169bd47be9e72e2ac36442c061fb
-
SSDEEP
3072:oVZTMYQ0qIN6NtVcOXHK5ULK2NUPj07eyRS6CSfKVu1xgCAWU8fvJqxEm4x1ESuS:YMnt3HP2PPjYp/1fvoxEvTE
Malware Config
Extracted
Family
fabookie
C2
http://app.alie3ksgaa.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3596-10-0x0000000002C20000-0x0000000002D50000-memory.dmp family_fabookie behavioral2/memory/3596-13-0x0000000002C20000-0x0000000002D50000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.