Analysis
-
max time kernel
88s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2024 02:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4a15d91920a4da9a64935248c126fb60e8302198df8e5759da8129ac1841beca.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
4a15d91920a4da9a64935248c126fb60e8302198df8e5759da8129ac1841beca.exe
-
Size
715KB
-
MD5
8dc1f88ae1fcedeb3983c5f5c3d486b0
-
SHA1
d40e67ba5558d90cb11eeca04d213322159336fc
-
SHA256
4a15d91920a4da9a64935248c126fb60e8302198df8e5759da8129ac1841beca
-
SHA512
0b2263fe049e280af1178fd396a06a04e6b99f7c971839207ae225161257ed9d9b7eaa8d0ceb1f14d3aa2094b53ce91dd045ebc169102e707ea7285f91432ac1
-
SSDEEP
6144:nA01Nd5uvxQWQSYYaE5CinBdRxQ7cUBmCUiJbc77ZvfuYuEdGxTC2EWf7xLUnw+V:ndo5QWJnnBIShtdGxTC2k5JL
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4728-10-0x0000000003640000-0x000000000376C000-memory.dmp family_fabookie behavioral2/memory/4728-13-0x0000000003640000-0x000000000376C000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.