Analysis
-
max time kernel
129s -
max time network
293s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-02-2024 04:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
28f74f8d6c20bab3d7b75c8210c553e67bc49fccf147f0fa27e4b5b7a2002560.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
300 seconds
General
-
Target
28f74f8d6c20bab3d7b75c8210c553e67bc49fccf147f0fa27e4b5b7a2002560.exe
-
Size
298KB
-
MD5
ca13816919b4505dbefba7145088b97c
-
SHA1
dcf00f75914ec2a1849b55c727865573355c83a5
-
SHA256
28f74f8d6c20bab3d7b75c8210c553e67bc49fccf147f0fa27e4b5b7a2002560
-
SHA512
c4bd88a6135d2a2fdf8cc28086086072178a3d49fb3d8e990c0aa4a3b5e1957c9fd6e2cf008d0c26011fadee2dd00fd629a3f9f72d3c5a19802a1694622f53fd
-
SSDEEP
6144:k7F5GxMr+PtCE2kWCZ3j9Z0CINiNbpxyN90vE:4FYxMqAEVBkCIWLy90
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/224-12-0x0000000002D40000-0x0000000002E6C000-memory.dmp family_fabookie behavioral2/memory/224-15-0x0000000002D40000-0x0000000002E6C000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.