Analysis
-
max time kernel
69s -
max time network
183s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
22-01-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
7b8053faf2b5a8cb0633ddf94f14c15199f09576b3407134d6a16ffeab14a0f7.exe
Resource
win7-20231215-en
General
-
Target
7b8053faf2b5a8cb0633ddf94f14c15199f09576b3407134d6a16ffeab14a0f7.exe
-
Size
715KB
-
MD5
289b96e36838078d29da5a1ad7e72918
-
SHA1
7708539e87419a9c54fdc3d1fc93d2e841bb4ba7
-
SHA256
7b8053faf2b5a8cb0633ddf94f14c15199f09576b3407134d6a16ffeab14a0f7
-
SHA512
099cff6fdb1e394e6c6d8db44eb8d2b69f721c9a119783cf4d25f3d5e243f0ca4ac52cd96d17f52fa48e1e507197e93d16be1b6399387206e6569af9f578dd93
-
SSDEEP
6144:nA01NdPuvxOWQSYYam57inOdRxQ7cUBmCUiJbc77ZvfuYuEdGxTC2QWf7xLUnw+V:nd25OWJYnOIShtdGxTC2g5JL
Malware Config
Extracted
fabookie
http://app.alie3ksgaa.com/check/safe
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/168-12-0x00000000032B0000-0x00000000033E0000-memory.dmp family_fabookie behavioral2/memory/168-15-0x00000000032B0000-0x00000000033E0000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.