Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2024 13:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownLoader45.60905.17111.7293.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Trojan.DownLoader45.60905.17111.7293.exe
-
Size
298KB
-
MD5
0b941f1bb25e443be09efec27f807341
-
SHA1
2b30cebcfaa3f71d37755a7ffa5afb9184fc5a26
-
SHA256
7cd7e631e7729dca4ffb4099dc22e95f625ae1ed79ba61a1330bba6072c8ce34
-
SHA512
678514cb22e5adbaadfb003a618528c586b8b33adc37aadd11ab1c6d7b9afb7801e66347e722d803635e030cc6e4900ff65bcd5bbcb0a0479d14b5be99f7b75e
-
SSDEEP
6144:k7F5GxMr+PtCE2kWCZ3j9Z0CINiNZpxyN90vE:4FYxMqAEVBkCIWBy90
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/2640-10-0x0000000003080000-0x00000000031A8000-memory.dmp family_fabookie behavioral2/memory/2640-13-0x0000000003080000-0x00000000031A8000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.