Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2024 10:23

General

  • Target

    SecuriteInfo.com.Trojan.DownLoader45.62336.4021.exe

  • Size

    416KB

  • MD5

    b799142f0247275b950d573fd171fb92

  • SHA1

    7be9070536ab6e85b973590398e7dfff5d4357d9

  • SHA256

    62af2f24a8e53b72b09ff55f94eb0723f491e1bee22fa15b3d938592d391740f

  • SHA512

    4209c0e7e9347ff2a0ac4dcc4fd250ce54b11d29bf30435dd57e94e9ebd32075a66596d983c683a6e935c5ca460a2d52446978e391252851137d54668d867cb2

  • SSDEEP

    6144:vyoFqDQLwcoEHMBoiT4MKBz3I8J/GxerEhgVIXFM:vHpUcoaCVrKi66erLIX

Malware Config

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoader45.62336.4021.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownLoader45.62336.4021.exe"
    1⤵
    • Modifies system certificate store
    PID:1044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    969e74d8cdbedb1d490184a8f8127b93

    SHA1

    4c85686b57e8edf3fb787563b2e3dd9c2d055753

    SHA256

    55b58cb38b2391193fbd146b12fb58b7cd4b337917f992a85ca8858e23e6e162

    SHA512

    c410adf771782ae2dbc56174303418818a659b3790fd441d88552ff574a2dbdacf2a9a4ca1031bcbcdbde6c2b8d98953df285e5021419f24747089189708d615

  • C:\Users\Admin\AppData\Local\Temp\Cab6AD6.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6B84.tmp

    Filesize

    97KB

    MD5

    c35b795e3c4a89faadbb1d672f34f915

    SHA1

    4d4157bc9e2afe167fc681b8b42f544b05b50424

    SHA256

    adcb10bec3b0577a6ff04ff27488c0a2fa546d0dc2104830365490ceb5c31171

    SHA512

    3a4be62b26c89ef12ae54731138ef931e949f2f4ce0cba07565b0d3128fc26658de49af1ace8baa33e18f008311d6b42bbd543b66c3729f26d0a250a31ed35aa

  • memory/1044-0-0x00000000FFBB0000-0x00000000FFC1A000-memory.dmp

    Filesize

    424KB

  • memory/1044-80-0x0000000002F50000-0x0000000003058000-memory.dmp

    Filesize

    1.0MB

  • memory/1044-81-0x00000000032A0000-0x00000000033C8000-memory.dmp

    Filesize

    1.2MB

  • memory/1044-84-0x00000000032A0000-0x00000000033C8000-memory.dmp

    Filesize

    1.2MB