Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2024 03:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
67a7cd9f9fef32fc81696237166d8359.exe
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
General
-
Target
67a7cd9f9fef32fc81696237166d8359.exe
-
Size
715KB
-
MD5
67a7cd9f9fef32fc81696237166d8359
-
SHA1
28c8e9288ec2c3a84a48312c8bac4fec0623205a
-
SHA256
af96622e503cea942a82577fe25a1284111cb3614a29aaaefaf393c059409008
-
SHA512
eda6e79114aaca8307ec1c31708f29a5aa7152aad3e3fde594d02916c0a04e7ead064afb200cc38d73de9d02f64f1eb7fb5a470d1c04f9b9e9f492ed812ecdaa
-
SSDEEP
6144:nA01NdBRvxQWQSYYaE57iibdoaxQ7cUBmCUiJbc77ZvfuYuEdGxTC2oWf7xLUnwa:nd/5QWJGibiFShtdGxTC2o5JL
Malware Config
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule behavioral2/memory/2868-10-0x00000000034A0000-0x00000000035C8000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.