Analysis
-
max time kernel
129s -
max time network
239s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-02-2024 04:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
105b388b438913a6442abbbf40abcb6ee3dfa02344293e5285648075198064dc.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
300 seconds
General
-
Target
105b388b438913a6442abbbf40abcb6ee3dfa02344293e5285648075198064dc.exe
-
Size
313KB
-
MD5
7ce10b71234d314619509bf0dc0fee29
-
SHA1
6ef03f0baba4852e1acf368b25cf48dda66749e2
-
SHA256
105b388b438913a6442abbbf40abcb6ee3dfa02344293e5285648075198064dc
-
SHA512
feaa4618fbc09fefa1542c27aa5dd1f915262c39ee9e2a8081ce3974f48559b906f5283735d4565e8ff0136ffbe87bd2208237531c7f36d8ea5a21823c563a5c
-
SSDEEP
3072:o8k/4Y/0qIN6NtVcOX5mK5ULK29UPj0geyRS6CSfKVu1xgCAWU8fvJqxEm4x1ES1:K4ot35mP2DPjTp/1fvoxEvTE
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/5024-12-0x00000000034C0000-0x00000000035EC000-memory.dmp family_fabookie behavioral2/memory/5024-15-0x00000000034C0000-0x00000000035EC000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.