Analysis
-
max time kernel
100s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2024 04:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b811f93bb852edfdceb786c087f409d9.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b811f93bb852edfdceb786c087f409d9.exe
-
Size
715KB
-
MD5
b811f93bb852edfdceb786c087f409d9
-
SHA1
60831662ee9b6d6111a02f4e1b1f91453c46a944
-
SHA256
8aeb0d61b1211fb7817a3d9f1ce69cd385f21f0c10b7df1eefe6c6e7fc6b9206
-
SHA512
326b3d38c671aaf83adadb5a7826d2008bae442b90042ba12d400d8cc65ff29c5850a59eb9ac5a3c0aa1767e815fc828da78a122f279eaeef284373ed6686e37
-
SSDEEP
6144:nA01Nd5uvxQWQSYYaE5CinBdRxQ7cUBmCUiJbc77ZvfuYuEdGxTC2iWf7xLUnw+V:ndo5QWJnnBIShtdGxTC2u5JL
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4596-10-0x0000000003420000-0x000000000354C000-memory.dmp family_fabookie behavioral2/memory/4596-13-0x0000000003420000-0x000000000354C000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.