Analysis
-
max time kernel
194s -
max time network
296s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
01-02-2024 04:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3fc3aac50bb79cc24d3a6722af98a178c6a94a0fb282211dc8a96ce59013f952.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
300 seconds
General
-
Target
3fc3aac50bb79cc24d3a6722af98a178c6a94a0fb282211dc8a96ce59013f952.exe
-
Size
298KB
-
MD5
f2cb695796db0c07a4e5a03a6ae2cc1f
-
SHA1
677690387bbe9629a588a3a88b07463f6da8ca14
-
SHA256
3fc3aac50bb79cc24d3a6722af98a178c6a94a0fb282211dc8a96ce59013f952
-
SHA512
80628fbceb195218cf9341504d495fad18ab762342ff458db73b5e77ef1e549097fdfe1587bc11b1e5efd81fe671837da24c161d34f3dc69b41885d0ac9ce3e4
-
SSDEEP
6144:k7F5GxMr+PtCE2kWCZ3j9Z0CINiN9pxyN90vE:4FYxMqAEVBkCIWly90
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/3320-12-0x0000000003620000-0x000000000374E000-memory.dmp family_fabookie behavioral2/memory/3320-15-0x0000000003620000-0x000000000374E000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.