Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2024 16:14

General

  • Target

    file.exe

  • Size

    326KB

  • MD5

    81ea5789584781307be5650dfe6e807d

  • SHA1

    559a768c71d8958601c4449f6189bd50895a6c9a

  • SHA256

    8b5089aa6f3f07193130b1702b63a0cfaf29c6fcec7337ab229185d81fb0d67c

  • SHA512

    e211ccee6c5be42aba1f8cfa99e9808e0b02af25b532edb42e8c5d5cf8775c624fea9ff62863ecb554f3c14315028dd71189eee3ff5565985cc2b0bcc125aaba

  • SSDEEP

    6144:kj83kXffMIwywVvUKBrcisb765kohreOwSYA/U:j3yfU3V1BrcdEkosCc

Malware Config

Extracted

Family

fabookie

C2

http://app.alie3ksgaa.com/check/safe

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
      PID:1688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1688-0-0x00007FF7B90B0000-0x00007FF7B9106000-memory.dmp

      Filesize

      344KB

    • memory/1688-9-0x0000028049A30000-0x0000028049B3B000-memory.dmp

      Filesize

      1.0MB

    • memory/1688-10-0x0000028049C70000-0x0000028049D9E000-memory.dmp

      Filesize

      1.2MB

    • memory/1688-13-0x0000028049C70000-0x0000028049D9E000-memory.dmp

      Filesize

      1.2MB