Analysis

  • max time kernel
    117s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2024 04:51

General

  • Target

    655ec713446b922fe8e9233e614d813906c4ce43c4db273180cd8c2c6a79d52c.exe

  • Size

    715KB

  • MD5

    f838df75b8246152af74728a058fa8c8

  • SHA1

    3eddf463a67b5a200b0737f4574224250e85068e

  • SHA256

    655ec713446b922fe8e9233e614d813906c4ce43c4db273180cd8c2c6a79d52c

  • SHA512

    5df11d0fea0b929fbdcfb223c10b1c266b041950f87fc7ad249dc369a55fc8c747330c5937d2effed2365c5cd8ccb0c673c98e2b9ac3f4b810cedda0fce5c8fd

  • SSDEEP

    6144:nA01NdBRvxQWQSYYaE57iibdoaxQ7cUBmCUiJbc77ZvfuYuEdGxTC2+Wf7xLUnwa:nd/5QWJGibiFShtdGxTC2K5JL

Malware Config

Extracted

Family

fabookie

C2

http://app.alie3ksgaa.com/check/safe

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\655ec713446b922fe8e9233e614d813906c4ce43c4db273180cd8c2c6a79d52c.exe
    "C:\Users\Admin\AppData\Local\Temp\655ec713446b922fe8e9233e614d813906c4ce43c4db273180cd8c2c6a79d52c.exe"
    1⤵
    • Modifies system certificate store
    PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    026b0fcde877fade7469fb10c62c9e8c

    SHA1

    70fc8012d93afb74280bc093e2bb7f8a3b361b62

    SHA256

    d2fd31d674cf14a868f4e933003c12479baf3ed141db9010e88543784d4fa07f

    SHA512

    13a3b622c03c1bf1cd7bab2394433b64e0fada7f1bc6ee0ac636e46be37b8768fdee292827bbe0f71d11f3915ceaef2c2edfae48e06c9f0f55a1bd99c9dc6c24

  • C:\Users\Admin\AppData\Local\Temp\CabF5E.tmp

    Filesize

    11KB

    MD5

    9f82879b07888eb215b7352066df8a56

    SHA1

    639b8bb330dd2750246a1c42486e0a0b44d14fc5

    SHA256

    ea4e369ac87b71e2f91774e91b906c2dfc3d53f2b4075acb2d59fd465aad0adb

    SHA512

    efb423e715382d2df340ceb76e1543b851fa5c428caa037d279b906bbe147e395eb8b921a9f6acba2c530043257aab8fe0092389066e42996496220ccf0a3fb4

  • C:\Users\Admin\AppData\Local\Temp\TarFDE.tmp

    Filesize

    56KB

    MD5

    8fa86704853649af9cc711c241dbba40

    SHA1

    7808f36f4e06ee837fa436649354410e1db87d36

    SHA256

    73aa99a94d87f9e17dfaad05cf450056a821eb8a4e2d63f071ccdba7b9b1a6c8

    SHA512

    2114c36a80373fb51aa15a115d4ba9e2f08ffc99e09493463333c872fe40f1e644dae3dad5d5b372da9eedee45815e73f2cc2bab72739f2cbdd62830a8e7bfa9

  • memory/2212-0-0x00000000FFCA0000-0x00000000FFD57000-memory.dmp

    Filesize

    732KB

  • memory/2212-81-0x0000000003430000-0x000000000355E000-memory.dmp

    Filesize

    1.2MB

  • memory/2212-80-0x00000000031F0000-0x00000000032FB000-memory.dmp

    Filesize

    1.0MB

  • memory/2212-84-0x0000000003430000-0x000000000355E000-memory.dmp

    Filesize

    1.2MB