Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2024 06:45

General

  • Target

    rty49.exe

  • Size

    715KB

  • MD5

    3e496c5bccc4c5b1186e6ed94056f462

  • SHA1

    aee5c6f162720ed91825d720e0b6ef1f0513e13c

  • SHA256

    635a839f2a2d2dcf6ef852a9db80a61104c69c7c9e2532d3413f7f82ddf4cbc1

  • SHA512

    a72d553a7d2fc1793ee3e5e464be48afd7c1fd824747546705a2659f6fd643ae4f03d1b9eaf545ea846beeb8f4c7faf1744ef545b9416ce1977d6d9d7a805c52

  • SSDEEP

    6144:nA01Nd5uvxQWQSYYaE5CinBdRxQ7cUBmCUiJbc77ZvfuYuEdGxTC28Wf7xLUnw+V:ndo5QWJnnBIShtdGxTC2M5JL

Malware Config

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rty49.exe
    "C:\Users\Admin\AppData\Local\Temp\rty49.exe"
    1⤵
    • Modifies system certificate store
    PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    34KB

    MD5

    81edb3b52d945c5692dabe2df9a18076

    SHA1

    af60c88ab85eaafe90cf45d1d07599f38420c613

    SHA256

    5768ee704584afcd7120af92e1613e25a7570e82570d8598b455d15b4394c159

    SHA512

    badcddf0f80e5c8fa7564af8fd161b82771345becbe73218522a2bc9d1d33645b2f16655596cec1a87c63ef470e2a3f6125f3a1a05a378f7ce8867e0a8a2e5fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    67212fd63865153253dddb18b16647d1

    SHA1

    4924a287ed2f276efe31904961ed95c4f40fe930

    SHA256

    6348d73572f3ee253c02038acfb8084be24421ab1c33baf480a717dcdc453b90

    SHA512

    2a0dda3cb5e086e0ec38455cfd642429869b64d48446a3321fc114f89d52109feef7d104f35bbf5e5eac0fdeb28427de5cabefcc096f96669f76b0379ebc101e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    47217260e8d1da95c3a9b788a3387e19

    SHA1

    9d71f13dd1e5dd8c9e3d7b23de744d3bd1025a28

    SHA256

    2776ed3e224fc110a69e0c88c48106c021b96925d4d95234cf83e8a21bc54b6a

    SHA512

    2199c58bf519b745285da7d63b9550107edee77c8d89722da3901871cff170667aa71d3d43cc032849fe62b4ce3694281c062a1d68229938ff5c9e2630a803bd

  • C:\Users\Admin\AppData\Local\Temp\Tar1C8B.tmp

    Filesize

    41KB

    MD5

    f829894972d410b3feef804e06adfb37

    SHA1

    ec26bfe6c7764b7a7c7b3a95c9d441ce4b22d43b

    SHA256

    a69101dc191a14ec4f89f56d52ca1abc5993a06a6f88cc95e5ace22f9dbb8c7d

    SHA512

    34603222878a3963875af028e16090b5b277892d2764558c34fb276bf01e3165d304ab34870516e4970eaeefd847403f05533553aecf5e16d379b792cdd6b9da

  • memory/2548-0-0x00000000FF0B0000-0x00000000FF167000-memory.dmp

    Filesize

    732KB

  • memory/2548-109-0x0000000003550000-0x000000000367C000-memory.dmp

    Filesize

    1.2MB

  • memory/2548-108-0x0000000003310000-0x000000000341A000-memory.dmp

    Filesize

    1.0MB

  • memory/2548-112-0x0000000003550000-0x000000000367C000-memory.dmp

    Filesize

    1.2MB