Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2024 18:17

General

  • Target

    file.exe

  • Size

    326KB

  • MD5

    5403c7f25701c2f3880998784e78b2f9

  • SHA1

    80d20005a5b012c4f92aedbb2ffa871685e8f64c

  • SHA256

    e2c50c779a1ef7e2f8ec1470fc1dc3e85b2886da0b514a9e0f2862d8648b2aa9

  • SHA512

    c18401741bc2c66351db55d15db07c95809314dd687655be1a7b687db4b4ab57ac538062bd0613166c99de92659ea137def15bfeab7a1230c734717938d0bcd4

  • SSDEEP

    6144:kj83kXffMIwywVvUKBrcisb765kohreOySYA/U:j3yfU3V1BrcdEko2Cc

Malware Config

Extracted

Family

fabookie

C2

http://app.alie3ksgaa.com/check/safe

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Modifies system certificate store
    PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    500B

    MD5

    89564eef36485c3f32bf7370f819c38c

    SHA1

    1db2a31a3f049a1cedbf5674955a897d028ab1fc

    SHA256

    691699459a1af3062219182c640f38437f868f2da67ecad81650ba70dab32f7a

    SHA512

    0dd48d43014c24a1cffe008460eec96140515ec3660ac4d449988c03e6196d79291634d77a702b05737d4bd3fc60f02c74c31b7a9156aa14c66179daa45fddb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65cfc290b80e8a810e1c1ea9f9c4eb9f

    SHA1

    db4ff9020ad5015b76fd173513b70b5d78678ca3

    SHA256

    0d79e3de0c84fbb237ac4be421de450a1a5aa9505841ee6b0989122d7f6acd8a

    SHA512

    e9440f5d71c17c3ffbd56b9ef4c808cbfed623dd83c3aca2679b4e2e3823e7776519843cb3dd0e2c50c87c11d3e1a3f7dedf25429abef705b1ed6ad7b78bb612

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    7755f7d4bd88ead7f0517d834fdabe51

    SHA1

    9e1af5e36100bbfe1e9d7de92cf465025bcd42d1

    SHA256

    4fc9f8cef1dbe652e29acb7e2d4cf2eb1956c8c7ba7c08873103d624d868fc82

    SHA512

    851a88e2f768fcf0229582d384e9471c1eec3485ef640310f6d012c11d6f41f66364b45ff0890e6d9b11a040909bab6d7dd482654591094af15a7ba86f3f309e

  • C:\Users\Admin\AppData\Local\Temp\Tar28BB.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/2552-0-0x000000013F530000-0x000000013F586000-memory.dmp

    Filesize

    344KB

  • memory/2552-108-0x00000000023C0000-0x00000000024CB000-memory.dmp

    Filesize

    1.0MB

  • memory/2552-109-0x0000000002600000-0x000000000272E000-memory.dmp

    Filesize

    1.2MB

  • memory/2552-112-0x0000000002600000-0x000000000272E000-memory.dmp

    Filesize

    1.2MB