Analysis

  • max time kernel
    129s
  • max time network
    239s
  • platform
    windows10-1703_x64
  • resource
    win10-20231220-en
  • resource tags

    arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-02-2024 04:47

General

  • Target

    105b388b438913a6442abbbf40abcb6ee3dfa02344293e5285648075198064dc.exe

  • Size

    313KB

  • MD5

    7ce10b71234d314619509bf0dc0fee29

  • SHA1

    6ef03f0baba4852e1acf368b25cf48dda66749e2

  • SHA256

    105b388b438913a6442abbbf40abcb6ee3dfa02344293e5285648075198064dc

  • SHA512

    feaa4618fbc09fefa1542c27aa5dd1f915262c39ee9e2a8081ce3974f48559b906f5283735d4565e8ff0136ffbe87bd2208237531c7f36d8ea5a21823c563a5c

  • SSDEEP

    3072:o8k/4Y/0qIN6NtVcOX5mK5ULK29UPj0geyRS6CSfKVu1xgCAWU8fvJqxEm4x1ES1:K4ot35mP2DPjTp/1fvoxEvTE

Malware Config

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\105b388b438913a6442abbbf40abcb6ee3dfa02344293e5285648075198064dc.exe
    "C:\Users\Admin\AppData\Local\Temp\105b388b438913a6442abbbf40abcb6ee3dfa02344293e5285648075198064dc.exe"
    1⤵
      PID:5024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5024-0-0x00007FF651F00000-0x00007FF651F52000-memory.dmp

      Filesize

      328KB

    • memory/5024-11-0x0000000003280000-0x000000000338A000-memory.dmp

      Filesize

      1.0MB

    • memory/5024-12-0x00000000034C0000-0x00000000035EC000-memory.dmp

      Filesize

      1.2MB

    • memory/5024-15-0x00000000034C0000-0x00000000035EC000-memory.dmp

      Filesize

      1.2MB