Analysis
-
max time kernel
89s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2024 05:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a6d05b0664378a130d90943b169986c3.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
a6d05b0664378a130d90943b169986c3.exe
-
Size
715KB
-
MD5
a6d05b0664378a130d90943b169986c3
-
SHA1
34f5e5102ae59d14bcd3c18e13607edc2d0d42f7
-
SHA256
48513a320dace9218b3612cb8496518620a07c9dc62f0e6d19f0e2639c6bc9f9
-
SHA512
858667f11bcd7dcc4ded28657b68fc602b4cfee0d4c0490b6c3a80d503339b8c478f2a90db4a0a6c909f0d8ead5c6a1cb36f1d9a6a867233a54b773c00ba0f4b
-
SSDEEP
6144:nA01Nd5uvxQWQSYYaE5CinBdRxQ7cUBmCUiJbc77ZvfuYuEdGxTC2gWf7xLUnw+V:ndo5QWJnnBIShtdGxTC2Q5JL
Malware Config
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4704-12-0x0000000002C90000-0x0000000002DBC000-memory.dmp family_fabookie behavioral2/memory/4704-15-0x0000000002C90000-0x0000000002DBC000-memory.dmp family_fabookie -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.