Analysis
-
max time kernel
291s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
21-01-2024 22:17
Static task
static1
Behavioral task
behavioral1
Sample
0c9093975346591d7fe991ed8bd448d21aaeb1d65b7c48122a19624e0775d583.exe
Resource
win7-20231215-en
General
-
Target
0c9093975346591d7fe991ed8bd448d21aaeb1d65b7c48122a19624e0775d583.exe
-
Size
396KB
-
MD5
34a7dbf9c978714dd0679079c5445a10
-
SHA1
476cebbf6d7a39ef3dd96e8d2d1d4684fb03faab
-
SHA256
0c9093975346591d7fe991ed8bd448d21aaeb1d65b7c48122a19624e0775d583
-
SHA512
9bea78ecc8ef389c3755626423cbc758357bca2345b2fc521d9113572a30c1bd84f85bf55693ba1c67ec3cac2aaef13d44641650c226629391612df27a43c1b0
-
SSDEEP
1536:XyK9MKyCC4UuOCWqeyGaOi2K+Sm6uCWqe+aOi2K+Sm6uuCuCWqeyGaOi2K+Sm6u9:XX9MLxuBXnAYy4AZ6qevcgJFW
Malware Config
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/332-12-0x0000000003450000-0x0000000003580000-memory.dmp family_fabookie behavioral2/memory/332-15-0x0000000003450000-0x0000000003580000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.